<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mandeep+Khera</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mandeep+Khera"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Mandeep_Khera"/>
		<updated>2026-04-24T06:54:51Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_USA_2011_chapters_workshop_agenda&amp;diff=116193</id>
		<title>AppSec USA 2011 chapters workshop agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_USA_2011_chapters_workshop_agenda&amp;diff=116193"/>
				<updated>2011-08-24T01:17:34Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== General Information ==&lt;br /&gt;
&lt;br /&gt;
As part of [http://www.appsecusa.org/ AppSec USA 2011], on '''Wednesday, September 21,2011 at 12:00h-15:00h''' at the Minneapolis Convention Center (Room # TBA), the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
'''Discussion topics include:'''&lt;br /&gt;
* How to improve the current Chapter Leader Handbook?&lt;br /&gt;
* How to start and support new chapters within Canada and the United States?&lt;br /&gt;
* How to support inactive chapters within Canada and the United States?&lt;br /&gt;
* What Governance model is required for OWASP chapters?&lt;br /&gt;
* How can the Global Chapters Committee facilitate the North American chapters?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec USA, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''August 8, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec USA conference.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After August 8, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Proposed agenda (open for discussion): &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Minneapolis Convention Center - Room TBA&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 12:00 - 12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Welcome and Introductions&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 12:15 - 1:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Handling chapter finances''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All '' &lt;br /&gt;
&lt;br /&gt;
Current chapter handbook [[:Chapter Handbook: Managing Money|section]] to be elaborated. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 1:00 - 1:15&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 1:15 - 2:00&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Top 10 advice for new and veteran chapter leaders''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Create list [https://www.owasp.org/index.php/Talk:AppSec_USA_2011_chapters_workshop_agenda upfront and add action, impact and required support] from the Chapters Committee. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 2:00 - 2:10&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 2:10 - 2:55&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''How to cross-pollinate success between Canadian and US chapters?''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Look for good pollinator mechanisms and [https://www.owasp.org/index.php/Talk:AppSec_USA_2011_chapters_workshop_agenda define 7 goals] to be accomplished by AppSec USA 2012 in Austin, Texas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
* Tin Zaw (Global Chapters Committee Chair) - Los Angeles Chapter &lt;br /&gt;
* Sarah Baso (Global Chapters Committee Administrator)&lt;br /&gt;
* Mandeep Khera (Bay Area Chapter Leader and Global Chapter Committee member)&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
There will be WiFi, so we can set up a Skype or WebEx conference call for people who want to listen in or participate remotely. &lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso] if you are interested in participating remotely.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapters Workshop at AppSec EU ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Minutes from Workshop]&lt;br /&gt;
&lt;br /&gt;
[[AppSecEU 2011 chapters workshop agenda]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Revising the Chapter Leader Handbook ==&lt;br /&gt;
&lt;br /&gt;
We hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Global_Chapters_Committee]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee&amp;diff=102783</id>
		<title>Global Chapter Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee&amp;diff=102783"/>
				<updated>2011-02-01T02:25:13Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
To provide the support required by the local chapters to thrive and contribute to the overall mission and goals of OWASP. &lt;br /&gt;
&lt;br /&gt;
== 2011 Goals  ==&lt;br /&gt;
&lt;br /&gt;
To be reviewed by the new Chapter Committee 2.0! &lt;br /&gt;
&lt;br /&gt;
*Provide chapters with useful resources to help them succeed. &lt;br /&gt;
*Help individuals in getting more from OWASP chapters. &lt;br /&gt;
*Ensure as many chapters as possible are healthy and active.&lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
Chair: to be elected. &lt;br /&gt;
&lt;br /&gt;
*[[:User:Sdeleersnyder|Seba Deleersnyder]] ('''Skype:''' seba.deleersnyder, '''Tel:''' +32.478.504.117, UTC+1) &lt;br /&gt;
*Puneet Mehta &lt;br /&gt;
*[[User:Mchalmers|Matthew Chalmers]] ('''Skype:''' mdchalmers) &lt;br /&gt;
*[http://www.owasp.org/index.php/User:Mandeep_Khera Mandeep Khera] (Skype:mandeepkhera), Tel:&amp;amp;nbsp;+1-650-274-8731)&amp;lt;br&amp;gt; &lt;br /&gt;
*Andrew van der Stock &lt;br /&gt;
*[[:User:Tin Zaw|Tin Zaw]] ('''Skype:''' tzaw.rr, '''Tel:''' +1.213.973.9295) &lt;br /&gt;
*[[User:Gustavo Barbato|L. Gustavo C. Barbato]] ('''Skype:''' lgbarbato)&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/How_to_Join_a_Committee How to join this committee] &lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/global_chapter_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Global Chapter Committee&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Meetings  ==&lt;br /&gt;
&lt;br /&gt;
The global chapters committee meets 2 times per month using Skype. &lt;br /&gt;
&lt;br /&gt;
*2nd Monday of the month @ 20h UTC for EU/US, fits for Andrew, Tin, Matthew, Mandeep, Kate, Gustavo, Seba &lt;br /&gt;
*2nd Tuesday of the month @ 14h UTC for US/Aspac/India, fits for Puneet, Kate, Tin (occasionally), Seba (occasionally), Andrew&lt;br /&gt;
&lt;br /&gt;
'''Please note that the January 2011 meeting date has been changed due to the 2011 Summit. See [[Global Chapter Committee/Meetings/2011-01]].''' &lt;br /&gt;
&lt;br /&gt;
The meeting is not a goal itself but is the due date for delivery of last month's tasks. The chair will send an invite to the meeting prior to the meeting. If you want to join the meeting please contact [mailto:seba@owasp.org Seba]. &lt;br /&gt;
&lt;br /&gt;
All meeting agendas and notes are on the [[:Category:Global Chapters Committee|Meeting Overview]] page. &lt;br /&gt;
&lt;br /&gt;
= Monthly Report Format  =&lt;br /&gt;
&lt;br /&gt;
Date of last update: &lt;br /&gt;
&lt;br /&gt;
Updated by: &lt;br /&gt;
&lt;br /&gt;
Accomplishments for This Month &lt;br /&gt;
&lt;br /&gt;
*First conference call with Andrew/Kate/Seba (see notes below) &lt;br /&gt;
*New Committee members for approval: Matthew Chalmers, Mandeep Khera, Tin Zaw, L. Gustavo C. Barbato &lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
Planned for Next Month &lt;br /&gt;
&lt;br /&gt;
*Revamp the committee &amp;amp;amp; set short &amp;amp;amp; long term planning &lt;br /&gt;
*Prepare for Summit 2011 &lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
Issues/Risks/Challenges &lt;br /&gt;
&lt;br /&gt;
*Get everyone on the same Skype call &lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
== Tasks  ==&lt;br /&gt;
&lt;br /&gt;
Everyone is busy. To make it possible for busy people to contribute, the Global Chapter Committee subdivides its goals into micro-tasks easily digestible in an hour or two by volunteers. &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;100&amp;quot; | Group &lt;br /&gt;
| width=&amp;quot;400&amp;quot; | Task &lt;br /&gt;
| width=&amp;quot;200&amp;quot; | Owner&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Rewrite the chapter welcome e-mail &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Chapters portal &lt;br /&gt;
| Sort out the chapter list into geographical areas &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| [[Chapter Presentation Bundles|Locate and list presentations for chapter meetings]] &lt;br /&gt;
| Puneet Mehta&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Locate and list other resources for chapters &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| [[:Category:OWASP Chapter|Revamp the chapters home page]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Chapters Handbook &lt;br /&gt;
| [[Chapter Handbook: Managing Money|Fill in the managing money section]] &lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| [[Chapter Handbook: Conferences and meetings|Fill in in the meetings section]] &lt;br /&gt;
| Mandeep Khera&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| [[Chapter Handbook: Marketing and growing a chapter|Fill in the marketing and growing a chapter section]] &lt;br /&gt;
| Mandeep Khera&lt;br /&gt;
|-&lt;br /&gt;
| Chapters survey &lt;br /&gt;
| Create a database of North American chapters including leaders, last meeting date and number of meetings in 2009. Start with an Excel list and then progress to sales force. &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Same for Europe &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Same for Asia &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Same for ROW &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Global_Chapters_Committee]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee&amp;diff=102782</id>
		<title>Global Chapter Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee&amp;diff=102782"/>
				<updated>2011-02-01T02:20:22Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
To provide the support required by the local chapters to thrive and contribute to the overall mission and goals of OWASP. &lt;br /&gt;
&lt;br /&gt;
== 2011 Goals  ==&lt;br /&gt;
&lt;br /&gt;
To be reviewed by the new Chapter Committee 2.0! &lt;br /&gt;
&lt;br /&gt;
*Provide chapters with useful resources to help them succeed. &lt;br /&gt;
*Help individuals in getting more from OWASP chapters. &lt;br /&gt;
*Ensure as many chapters as possible are healthy and active.&lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
Chair: to be elected. &lt;br /&gt;
&lt;br /&gt;
*[[:User:Sdeleersnyder|Seba Deleersnyder]] ('''Skype:''' seba.deleersnyder, '''Tel:''' +32.478.504.117, UTC+1) &lt;br /&gt;
*Puneet Mehta &lt;br /&gt;
*[[User:Mchalmers|Matthew Chalmers]] ('''Skype:''' mdchalmers) &lt;br /&gt;
*Mandeep Khera (Skype:mandeepkhera), Tel:&amp;amp;nbsp;+1-650-274-8731)&amp;lt;br&amp;gt; &lt;br /&gt;
*Andrew van der Stock &lt;br /&gt;
*[[:User:Tin Zaw|Tin Zaw]] ('''Skype:''' tzaw.rr, '''Tel:''' +1.213.973.9295) &lt;br /&gt;
*[[User:Gustavo Barbato|L. Gustavo C. Barbato]] ('''Skype:''' lgbarbato)&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/How_to_Join_a_Committee How to join this committee] &lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/global_chapter_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Global Chapter Committee&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Meetings  ==&lt;br /&gt;
&lt;br /&gt;
The global chapters committee meets 2 times per month using Skype. &lt;br /&gt;
&lt;br /&gt;
*2nd Monday of the month @ 20h UTC for EU/US, fits for Andrew, Tin, Matthew, Mandeep, Kate, Gustavo, Seba &lt;br /&gt;
*2nd Tuesday of the month @ 14h UTC for US/Aspac/India, fits for Puneet, Kate, Tin (occasionally), Seba (occasionally), Andrew&lt;br /&gt;
&lt;br /&gt;
'''Please note that the January 2011 meeting date has been changed due to the 2011 Summit. See [[Global Chapter Committee/Meetings/2011-01]].''' &lt;br /&gt;
&lt;br /&gt;
The meeting is not a goal itself but is the due date for delivery of last month's tasks. The chair will send an invite to the meeting prior to the meeting. If you want to join the meeting please contact [mailto:seba@owasp.org Seba]. &lt;br /&gt;
&lt;br /&gt;
All meeting agendas and notes are on the [[:Category:Global Chapters Committee|Meeting Overview]] page. &lt;br /&gt;
&lt;br /&gt;
= Monthly Report Format  =&lt;br /&gt;
&lt;br /&gt;
Date of last update: &lt;br /&gt;
&lt;br /&gt;
Updated by: &lt;br /&gt;
&lt;br /&gt;
Accomplishments for This Month &lt;br /&gt;
&lt;br /&gt;
*First conference call with Andrew/Kate/Seba (see notes below) &lt;br /&gt;
*New Committee members for approval: Matthew Chalmers, Mandeep Khera, Tin Zaw, L. Gustavo C. Barbato &lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
Planned for Next Month &lt;br /&gt;
&lt;br /&gt;
*Revamp the committee &amp;amp;amp; set short &amp;amp;amp; long term planning &lt;br /&gt;
*Prepare for Summit 2011 &lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
Issues/Risks/Challenges &lt;br /&gt;
&lt;br /&gt;
*Get everyone on the same Skype call &lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
== Tasks  ==&lt;br /&gt;
&lt;br /&gt;
Everyone is busy. To make it possible for busy people to contribute, the Global Chapter Committee subdivides its goals into micro-tasks easily digestible in an hour or two by volunteers. &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;100&amp;quot; | Group &lt;br /&gt;
| width=&amp;quot;400&amp;quot; | Task &lt;br /&gt;
| width=&amp;quot;200&amp;quot; | Owner&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Rewrite the chapter welcome e-mail &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Chapters portal &lt;br /&gt;
| Sort out the chapter list into geographical areas &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| [[Chapter Presentation Bundles|Locate and list presentations for chapter meetings]] &lt;br /&gt;
| Puneet Mehta&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Locate and list other resources for chapters &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| [[:Category:OWASP Chapter|Revamp the chapters home page]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Chapters Handbook &lt;br /&gt;
| [[Chapter Handbook: Managing Money|Fill in the managing money section]] &lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| [[Chapter Handbook: Conferences and meetings|Fill in in the meetings section]] &lt;br /&gt;
| Mandeep Khera&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| [[Chapter Handbook: Marketing and growing a chapter|Fill in the marketing and growing a chapter section]] &lt;br /&gt;
| Mandeep Khera&lt;br /&gt;
|-&lt;br /&gt;
| Chapters survey &lt;br /&gt;
| Create a database of North American chapters including leaders, last meeting date and number of meetings in 2009. Start with an Excel list and then progress to sales force. &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Same for Europe &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Same for Asia &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| Same for ROW &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Global_Chapters_Committee]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session018&amp;diff=100384</id>
		<title>Summit 2011 Working Sessions/Session018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session018&amp;diff=100384"/>
				<updated>2011-01-14T07:59:50Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Mandeep Khera&lt;br /&gt;
| summit_session_attendee_email1 = &lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = &lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = &lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._global_committees.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._global_commitee.jpg‎]]&lt;br /&gt;
| summit_session_name = Chapters&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018&lt;br /&gt;
| mailing_list =&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= Challenges and solutions to run a successful OWASP chapter&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = OWASP Chapter Handbook&lt;br /&gt;
| related_project_url_1 = http://www.owasp.org/index.php/Category:Chapter_Handbook&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = OWASP Speaker Project&lt;br /&gt;
| related_project_url_2 = http://www.owasp.org/index.php/Category:OWASP_Speakers_Project&lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = OWASP on the Move&lt;br /&gt;
| related_project_url_3 = http://www.owasp.org/index.php/Category:OWASP_on_the_Move_Project&lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= Challenges and solutions to run a successful OWASP chapter&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = &lt;br /&gt;
|summit_session_deliverable_url_1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
|summit_session_deliverable_url_2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
|summit_session_deliverable_url_3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
|summit_session_deliverable_url_4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
|summit_session_deliverable_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Seba&lt;br /&gt;
| summit_session_leader_email1 = seba@owasp.org&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session018&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session018&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Attendee/Attendee070&amp;diff=96210</id>
		<title>Summit 2011 Attendee/Attendee070</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Attendee/Attendee070&amp;diff=96210"/>
				<updated>2010-12-14T01:33:47Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;img _fck_mw_includeonly=&amp;quot;true&amp;quot; _fckrealelement=&amp;quot;3&amp;quot; _fckfakelement=&amp;quot;true&amp;quot; src=&amp;quot;http://www.owasp.org/extensions/FCKeditor/fckeditor/editor/images/spacer.gif&amp;quot; class=&amp;quot;FCK__MWIncludeonly&amp;quot;&amp;gt;&amp;lt;img _fck_mw_noinclude=&amp;quot;true&amp;quot; _fckrealelement=&amp;quot;2&amp;quot; _fckfakelement=&amp;quot;true&amp;quot; src=&amp;quot;http://www.owasp.org/extensions/FCKeditor/fckeditor/editor/images/spacer.gif&amp;quot; class=&amp;quot;FCK__MWNoinclude&amp;quot;&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_name1 = Mandeep Khera&lt;br /&gt;
| summit_attendee_email1 = mkhera@owasp.org&lt;br /&gt;
| summit_attendee_wiki_username1 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_company = Cenzic&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_current_owasp_involvement_name1 =  SF Bay Area Chapter Leader, &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_1 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name2 =  Active Chapter Committee Member &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_2 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name3 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_3 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name4 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_4 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name5 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name1 =  Participation in committee discussion&lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_1 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_1 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name2 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_2 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_2 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name3 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_3 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_3 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name4 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_4 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_4 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name5 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_5 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_5 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_owasp_sponsor = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_summit_time_paid_by_name1 =&lt;br /&gt;
| summit_attendee_summit_time_paid_by_url_1 =&lt;br /&gt;
| summit_attendee_summit_time_paid_by_name2 =&lt;br /&gt;
| summit_attendee_summit_time_paid_by_url_2 =&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_name1 = &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_url_1 = &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_name2 = &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_url_2 =&lt;br /&gt;
|-&lt;br /&gt;
| reason_for_sponsorship = Committee Participation&lt;br /&gt;
|-&lt;br /&gt;
| status = &lt;br /&gt;
|-&lt;br /&gt;
| letter sent to sponsor = &lt;br /&gt;
|-&lt;br /&gt;
| notes for Kate = &lt;br /&gt;
|-&lt;br /&gt;
| attendee_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Attendee070&lt;br /&gt;
| attendee_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Attendee/Attendee070 &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_4&amp;diff=93115</id>
		<title>Global Chapter Committee - Application 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_4&amp;diff=93115"/>
				<updated>2010-11-17T00:35:17Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;1&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Tin Zaw.&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;1&amp;quot; | OWASP Los Angeles chapter leader, AppSec USA 2010 co-chair.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;1&amp;quot; | OWASP Global Chapters Committee.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;8&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% white; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | richard greenberg &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Los Angeles Board/Global Conf Committee &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Tin is a visionary leader, and a very dedicated and hard worker. His leadership and perseverance were key in making AppSec SoCal such a sucess. He always had great ideas and spoke his mind during the planning meetings, but was always considerate of other ideas and points of view.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Cassio Goldschmidt &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP LA Board &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Tin brought a lot of much needed structure and consistency to the Los Angeles chapter. During his tenure the chapter was able to find dinner sponsors, have a good line up of monthly speakers annnounced well in advance and host AppSec 2010 USA. I highly recommend Tin for the position.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Mark Bristow &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP Global Conferences Committee Chair &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Tin did an excellent job in support of AppSec US 2010. I believe he would make a great addition to the Global Chapter committee.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Mandeep Khera&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP SF Bay Area Leader&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Tin did a great job as a co-chair of AppSec 2010. He also has a lot of relevant professional experience to help in these efforts. &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=86429</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=86429"/>
				<updated>2010-07-13T19:31:48Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. &lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Bay Area Chapter - Application Security Summit &lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': SAP Offices, Palo Alto - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Venue and Directions:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto, Building 1 Executive Briefing Center (2nd Floor) &lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPONSORS:&amp;amp;nbsp;[http://www.appsecconsulting.com/ Appsec Consulting],[http://www.cenzic.com/ Cenzic],[http://www.dasient.com/ Dasient], [http://www.sap.com/usa/about/company/saplabs/index.epx SAP&amp;amp;nbsp;Labs] &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 736px; height: 330px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader - [[Image:OWASP Mandeep Khera BA July10.pdf]] &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient- [[Image:OWASP Dasient 7 1 10.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎ and Alex Bello, Director of Technical Operations and Product Security, IronKey- [[Image:OWASP-Building-Secure-Web-Apps-070110.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎- [[Image:OWASP Cloudy with a chance of hack.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix - [[Image:OWASP-July-Anoop.pdf]] &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign - [[Image:MashSSL OWASP Presentation june2010.pdf]] &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''Drive By Downloads: How To Avoid Getting A Cap Popped In Your App:&amp;amp;nbsp;'''Which browser do you claim? What color is your screen-saver? It is a world wide hood out there, don’t let yourself become the next victim of a drive by… a drive by download. Email attachments have become synonymous with computer viruses and consumers have become accustom to questioning the legitimacy of email touting male enhancement drugs and lottery winnings. This means hackers are having to come up with new ways to distribute malware. Today, just by loading an infected webpage of from a legitimate website, a virus can be downloaded without any other interaction and will often go undetected. Once the virus is on a PC, hackers can access the computer remotely and steal sensitive information like banking passwords, send out spam or install more malicious executables. &lt;br /&gt;
&lt;br /&gt;
In this talk, we describe in technical detail the &amp;quot;anatomy of a modern web-based malware attack.&amp;quot; Web-based malware attacks have evolved significantly over the past 4 years. We present the state-of-the-art in web-based malware attacks and describe how the techniques used have evolved over time. '''&amp;lt;br&amp;gt;Bio - '''Neil Daswani is a co-founder of Dasient, Inc., a security company backed by some of the most influential investors in Silicon Valley and New York. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security). He has published extensively, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University. Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g. More information about Neil is available at http://www.neildaswani.com. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Building Secure Web Applications: ''' This presentation will go over core principles involved in launching secure web applications and effectively managing security in a cloud services environment. We will discuss best practices for implementing security programs, review examples of things done right and wrong, and address specific steps required for creating and maintaining a sustainable security framework for your web applications. &amp;lt;br&amp;gt;'''Bio '''- Misha Logvinov is the Vice President of Online Operations at IronKey. In this position, Mr. Logvinov and his team are responsible for designing, implementing and supporting a highly-scalable mission critical infrastructure for IronKey's next-generation security products and services. Mr. Logvinov brings to IronKey over a decade of management experience in information technology, operations and security. Throughout his career, he has been responsible for implementing hundreds of customer solutions, supporting millions of online users, managing complex backoffice applications and building some of the world's most secure online service environments. Prior to IronKey, Mr. Logvinov spent six years at Yodlee, one of the leading online financial service providers. He held various management roles during his tenure, most recently, as Director of Operations Delivery. Mr. Logvinov's earlier experiences included IT management at Outcome, Inc. and INTERSHOP Communications. Mr. Logvinov holds a BA in Business Administration from Plekhanov Russian Academy of Economics. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
'''Bio '''- Alex Bello has been involved in the computer security field for the last six years with over ten years of combined experience in technical operations, web application development and security. Mr. Bello is currently serving as the Director of Technical Operations and the Product Security Team Lead at IronKey. Mr. Bello is responsible for architecture, operations and security management of the IronKey online services portfolio as well as IronKey products security testing and research. Prior to IronKey, Mr. Bello spent over three years consulting for various security organizations on infrastructure architecture, security research and web application development projects. Earlier in his career, Mr. Bello managed technical operations at one of the biggest online social marketplaces. In addition to his work at IronKey, for the last five years Mr. Bello has been responsible for technical operations and engineering at Anti-Phishing Working Group (APWG) supporting data aggregation, processing and consumption technologies behind one of the largest anti-phishing UBLs.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Cloudy with a chance of a hack: '''Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud computing solutions out there - one of the main ones being security. Most of these solutions were built for ease of use and without necessarily security in mind. Companies should ask the solution provider the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. &amp;lt;br&amp;gt;'''Bio '''– Lars Ewe''': '''Chief Technology Officer and VP of Engineering for Cenzic. Lars Ewe is a technology executive with broad background in (web) application development and security, middleware infrastructure, software development and application/system manageability technologies. Throughout his career Lars has held key positions in engineering and product management in a variety of different markets. Prior to Cenzic, Lars was software development director at Advanced Micro Devices, Inc., responsible for AMD's overall systems manageability and related security strategy and all related engineering efforts. &lt;br /&gt;
&lt;br /&gt;
'''Application Security Deployment Tradeoffs:''' Application security tradeoffs and choices are made at various stages of application design, development and deployment. This talk will cover deployment aspects of application security. Based on experience in designing, developing and deploying application security solutions and products for the past 10 years, I will do a case study based analysis of security costs and tradeoffs. Specifically, we will correlate security choices during deployment with our observations regarding the relatively higher adoption of security features and products that have an incremental deployment plan over those that are more intrusive and/or are operationally more expensive. &amp;lt;br&amp;gt;'''Bio '''– Anoop Reddy Anoop Reddy has been working in Security and Application Firewalls for the past 8 years and has led many innovations as part of Teros and Citrix. He was the Architect and Technical Lead at Teros and now manages the Engineering Development for the Application Firewall product lines at Citrix. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MashSSL - '''Extending SSL for securing mashups: In this presentation we will describe MashSSL and how it can be used to solve a fundamental Internet security problem - when two web applications communicate through a potentially un-trusted user they do not have any standard way of mutually authenticating each other and establishing a trusted channel. MashSSL is a new multi-party protocol that has been expressly designed to inherit the security properties of SSL, and to be able to leverage its trust infrastructure. We will also discuss how this can be used to secure a variety of multi-party environments including mashups using Cross-domain XHR, OpenAJAX, as well as scenarios such as OpenID and OAuth. &amp;lt;br&amp;gt;'''Bio '''– Siddharth Bajaj is researching new technologies in the areas of Internet Trust, Identity and Authentication including how these can be applied to solve problems in verticals such as healthcare, online content and cloud computing. Siddharth has been with VeriSign since 1999 and has fulfilled variety of technical leadership roles. He was involved in the development of the VeriSign PKI services platform as well as the early conceptualization and architecture of more recent VeriSign products such as UA and VIP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== RSVP  ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MashSSL_OWASP_Presentation_june2010.pdf&amp;diff=86425</id>
		<title>File:MashSSL OWASP Presentation june2010.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MashSSL_OWASP_Presentation_june2010.pdf&amp;diff=86425"/>
				<updated>2010-07-13T19:23:28Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-July-Anoop.pdf&amp;diff=86424</id>
		<title>File:OWASP-July-Anoop.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-July-Anoop.pdf&amp;diff=86424"/>
				<updated>2010-07-13T19:22:36Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Cloudy_with_a_chance_of_hack.pdf&amp;diff=86423</id>
		<title>File:OWASP Cloudy with a chance of hack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Cloudy_with_a_chance_of_hack.pdf&amp;diff=86423"/>
				<updated>2010-07-13T19:21:53Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-Building-Secure-Web-Apps-070110.pdf&amp;diff=86422</id>
		<title>File:OWASP-Building-Secure-Web-Apps-070110.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-Building-Secure-Web-Apps-070110.pdf&amp;diff=86422"/>
				<updated>2010-07-13T19:19:11Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Dasient_7_1_10.pdf&amp;diff=86421</id>
		<title>File:OWASP Dasient 7 1 10.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Dasient_7_1_10.pdf&amp;diff=86421"/>
				<updated>2010-07-13T19:18:30Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Mandeep_Khera_BA_July10.pdf&amp;diff=86420</id>
		<title>File:OWASP Mandeep Khera BA July10.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Mandeep_Khera_BA_July10.pdf&amp;diff=86420"/>
				<updated>2010-07-13T19:17:21Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=85530</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=85530"/>
				<updated>2010-06-28T17:08:04Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. &lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Bay Area Chapter - Application Security Summit &lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': SAP Offices, Palo Alto - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Venue and Directions:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto, Building 1 Executive Briefing Center (2nd Floor) &lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPONSORS:&amp;amp;nbsp;[http://www.appsecconsulting.com/ Appsec Consulting],[http://www.cenzic.com/ Cenzic],[http://www.dasient.com/ Dasient], [http://www.sap.com/usa/about/company/saplabs/index.epx SAP&amp;amp;nbsp;Labs] &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 736px; height: 330px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎ and Alex Bello, Director of Technical Operations and Product Security, IronKey&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''Drive By Downloads: How To Avoid Getting A Cap Popped In Your App:&amp;amp;nbsp;'''Which browser do you claim? What color is your screen-saver? It is a world wide hood out there, don’t let yourself become the next victim of a drive by… a drive by download. Email attachments have become synonymous with computer viruses and consumers have become accustom to questioning the legitimacy of email touting male enhancement drugs and lottery winnings. This means hackers are having to come up with new ways to distribute malware. Today, just by loading an infected webpage of from a legitimate website, a virus can be downloaded without any other interaction and will often go undetected. Once the virus is on a PC, hackers can access the computer remotely and steal sensitive information like banking passwords, send out spam or install more malicious executables. &lt;br /&gt;
&lt;br /&gt;
In this talk, we describe in technical detail the &amp;quot;anatomy of a modern web-based malware attack.&amp;quot; Web-based malware attacks have evolved significantly over the past 4 years. We present the state-of-the-art in web-based malware attacks and describe how the techniques used have evolved over time. '''&amp;lt;br&amp;gt;Bio - '''Neil Daswani is a co-founder of Dasient, Inc., a security company backed by some of the most influential investors in Silicon Valley and New York. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security). He has published extensively, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University. Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g. More information about Neil is available at http://www.neildaswani.com. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Building Secure Web Applications: ''' This presentation will go over core principles involved in launching secure web applications and effectively managing security in a cloud services environment. We will discuss best practices for implementing security programs, review examples of things done right and wrong, and address specific steps required for creating and maintaining a sustainable security framework for your web applications. &amp;lt;br&amp;gt;'''Bio '''- Misha Logvinov is the Vice President of Online Operations at IronKey. In this position, Mr. Logvinov and his team are responsible for designing, implementing and supporting a highly-scalable mission critical infrastructure for IronKey's next-generation security products and services. Mr. Logvinov brings to IronKey over a decade of management experience in information technology, operations and security. Throughout his career, he has been responsible for implementing hundreds of customer solutions, supporting millions of online users, managing complex backoffice applications and building some of the world's most secure online service environments. Prior to IronKey, Mr. Logvinov spent six years at Yodlee, one of the leading online financial service providers. He held various management roles during his tenure, most recently, as Director of Operations Delivery. Mr. Logvinov's earlier experiences included IT management at Outcome, Inc. and INTERSHOP Communications. Mr. Logvinov holds a BA in Business Administration from Plekhanov Russian Academy of Economics. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
'''Bio '''- Alex Bello has been involved in the computer security field for the last six years with over ten years of combined experience in technical operations, web application development and security. Mr. Bello is currently serving as the Director of Technical Operations and the Product Security Team Lead at IronKey. Mr. Bello is responsible for architecture, operations and security management of the IronKey online services portfolio as well as IronKey products security testing and research. Prior to IronKey, Mr. Bello spent over three years consulting for various security organizations on infrastructure architecture, security research and web application development projects. Earlier in his career, Mr. Bello managed technical operations at one of the biggest online social marketplaces. In addition to his work at IronKey, for the last five years Mr. Bello has been responsible for technical operations and engineering at Anti-Phishing Working Group (APWG) supporting data aggregation, processing and consumption technologies behind one of the largest anti-phishing UBLs.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Cloudy with a chance of a hack: '''Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud computing solutions out there - one of the main ones being security. Most of these solutions were built for ease of use and without necessarily security in mind. Companies should ask the solution provider the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. &amp;lt;br&amp;gt;'''Bio '''– Lars Ewe''': '''Chief Technology Officer and VP of Engineering for Cenzic. Lars Ewe is a technology executive with broad background in (web) application development and security, middleware infrastructure, software development and application/system manageability technologies. Throughout his career Lars has held key positions in engineering and product management in a variety of different markets. Prior to Cenzic, Lars was software development director at Advanced Micro Devices, Inc., responsible for AMD's overall systems manageability and related security strategy and all related engineering efforts. &lt;br /&gt;
&lt;br /&gt;
'''Application Security Deployment Tradeoffs:''' Application security tradeoffs and choices are made at various stages of application design, development and deployment. This talk will cover deployment aspects of application security. Based on experience in designing, developing and deploying application security solutions and products for the past 10 years, I will do a case study based analysis of security costs and tradeoffs. Specifically, we will correlate security choices during deployment with our observations regarding the relatively higher adoption of security features and products that have an incremental deployment plan over those that are more intrusive and/or are operationally more expensive. &amp;lt;br&amp;gt;'''Bio '''– Anoop Reddy Anoop Reddy has been working in Security and Application Firewalls for the past 8 years and has led many innovations as part of Teros and Citrix. He was the Architect and Technical Lead at Teros and now manages the Engineering Development for the Application Firewall product lines at Citrix. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MashSSL - '''Extending SSL for securing mashups: In this presentation we will describe MashSSL and how it can be used to solve a fundamental Internet security problem - when two web applications communicate through a potentially un-trusted user they do not have any standard way of mutually authenticating each other and establishing a trusted channel. MashSSL is a new multi-party protocol that has been expressly designed to inherit the security properties of SSL, and to be able to leverage its trust infrastructure. We will also discuss how this can be used to secure a variety of multi-party environments including mashups using Cross-domain XHR, OpenAJAX, as well as scenarios such as OpenID and OAuth. &amp;lt;br&amp;gt;'''Bio '''– Siddharth Bajaj is researching new technologies in the areas of Internet Trust, Identity and Authentication including how these can be applied to solve problems in verticals such as healthcare, online content and cloud computing. Siddharth has been with VeriSign since 1999 and has fulfilled variety of technical leadership roles. He was involved in the development of the VeriSign PKI services platform as well as the early conceptualization and architecture of more recent VeriSign products such as UA and VIP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== RSVP  ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=85529</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=85529"/>
				<updated>2010-06-28T17:06:27Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. &lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Bay Area Chapter - Application Security Summit &lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': SAP Offices, Palo Alto - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Venue and Directions:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto, Building 1 Executive Briefing Center (2nd Floor) &lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPONSORS:&amp;amp;nbsp;[http://www.appsecconsulting.com/ Appsec Consulting],[http://www.cenzic.com/ Cenzic],[http://www.dasient.com/ Dasient], [http://www.sap.com/usa/about/company/saplabs/index.epx SAP&amp;amp;nbsp;Labs] &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 935px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎ and Alex Bello, Director of Technical Operations and Product Security, IronKey&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''Drive By Downloads: How To Avoid Getting A Cap Popped In Your App:&amp;amp;nbsp;'''Which browser do you claim? What color is your screen-saver? It is a world wide hood out there, don’t let yourself become the next victim of a drive by… a drive by download. Email attachments have become synonymous with computer viruses and consumers have become accustom to questioning the legitimacy of email touting male enhancement drugs and lottery winnings. This means hackers are having to come up with new ways to distribute malware. Today, just by loading an infected webpage of from a legitimate website, a virus can be downloaded without any other interaction and will often go undetected. Once the virus is on a PC, hackers can access the computer remotely and steal sensitive information like banking passwords, send out spam or install more malicious executables. &lt;br /&gt;
&lt;br /&gt;
In this talk, we describe in technical detail the &amp;quot;anatomy of a modern web-based malware attack.&amp;quot; Web-based malware attacks have evolved significantly over the past 4 years. We present the state-of-the-art in web-based malware attacks and describe how the techniques used have evolved over time. '''&amp;lt;br&amp;gt;Bio - '''Neil Daswani is a co-founder of Dasient, Inc., a security company backed by some of the most influential investors in Silicon Valley and New York. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security). He has published extensively, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University. Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g. More information about Neil is available at http://www.neildaswani.com. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Building Secure Web Applications: ''' This presentation will go over core principles involved in launching secure web applications and effectively managing security in a cloud services environment. We will discuss best practices for implementing security programs, review examples of things done right and wrong, and address specific steps required for creating and maintaining a sustainable security framework for your web applications. &amp;lt;br&amp;gt;'''Bio '''- Misha Logvinov is the Vice President of Online Operations at IronKey. In this position, Mr. Logvinov and his team are responsible for designing, implementing and supporting a highly-scalable mission critical infrastructure for IronKey's next-generation security products and services. Mr. Logvinov brings to IronKey over a decade of management experience in information technology, operations and security. Throughout his career, he has been responsible for implementing hundreds of customer solutions, supporting millions of online users, managing complex backoffice applications and building some of the world's most secure online service environments. Prior to IronKey, Mr. Logvinov spent six years at Yodlee, one of the leading online financial service providers. He held various management roles during his tenure, most recently, as Director of Operations Delivery. Mr. Logvinov's earlier experiences included IT management at Outcome, Inc. and INTERSHOP Communications. Mr. Logvinov holds a BA in Business Administration from Plekhanov Russian Academy of Economics. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
'''Bio '''- Alex Bello has been involved in the computer security field for the last six years with over ten years of combined experience in technical operations, web application development and security. Mr. Bello is currently serving as the Director of Technical Operations and the Product Security Team Lead at IronKey. Mr. Bello is responsible for architecture, operations and security management of the IronKey online services portfolio as well as IronKey products security testing and research. Prior to IronKey, Mr. Bello spent over three years consulting for various security organizations on infrastructure architecture, security research and web application development projects. Earlier in his career, Mr. Bello managed technical operations at one of the biggest online social marketplaces. In addition to his work at IronKey, for the last five years Mr. Bello has been responsible for technical operations and engineering at Anti-Phishing Working Group (APWG) supporting data aggregation, processing and consumption technologies behind one of the largest anti-phishing UBLs.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Cloudy with a chance of a hack: '''Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud computing solutions out there - one of the main ones being security. Most of these solutions were built for ease of use and without necessarily security in mind. Companies should ask the solution provider the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. &amp;lt;br&amp;gt;'''Bio '''– Lars Ewe''': '''Chief Technology Officer and VP of Engineering for Cenzic. Lars Ewe is a technology executive with broad background in (web) application development and security, middleware infrastructure, software development and application/system manageability technologies. Throughout his career Lars has held key positions in engineering and product management in a variety of different markets. Prior to Cenzic, Lars was software development director at Advanced Micro Devices, Inc., responsible for AMD's overall systems manageability and related security strategy and all related engineering efforts. &lt;br /&gt;
&lt;br /&gt;
'''Application Security Deployment Tradeoffs:''' Application security tradeoffs and choices are made at various stages of application design, development and deployment. This talk will cover deployment aspects of application security. Based on experience in designing, developing and deploying application security solutions and products for the past 10 years, I will do a case study based analysis of security costs and tradeoffs. Specifically, we will correlate security choices during deployment with our observations regarding the relatively higher adoption of security features and products that have an incremental deployment plan over those that are more intrusive and/or are operationally more expensive. &amp;lt;br&amp;gt;'''Bio '''– Anoop Reddy Anoop Reddy has been working in Security and Application Firewalls for the past 8 years and has led many innovations as part of Teros and Citrix. He was the Architect and Technical Lead at Teros and now manages the Engineering Development for the Application Firewall product lines at Citrix. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MashSSL - '''Extending SSL for securing mashups: In this presentation we will describe MashSSL and how it can be used to solve a fundamental Internet security problem - when two web applications communicate through a potentially un-trusted user they do not have any standard way of mutually authenticating each other and establishing a trusted channel. MashSSL is a new multi-party protocol that has been expressly designed to inherit the security properties of SSL, and to be able to leverage its trust infrastructure. We will also discuss how this can be used to secure a variety of multi-party environments including mashups using Cross-domain XHR, OpenAJAX, as well as scenarios such as OpenID and OAuth. &amp;lt;br&amp;gt;'''Bio '''– Siddharth Bajaj is researching new technologies in the areas of Internet Trust, Identity and Authentication including how these can be applied to solve problems in verticals such as healthcare, online content and cloud computing. Siddharth has been with VeriSign since 1999 and has fulfilled variety of technical leadership roles. He was involved in the development of the VeriSign PKI services platform as well as the early conceptualization and architecture of more recent VeriSign products such as UA and VIP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== RSVP  ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84859</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84859"/>
				<updated>2010-06-13T23:29:31Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. &lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Bay Area Chapter - Application Security Summit &lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': SAP Offices, Palo Alto - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Venue and Directions:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto, Building 1 Executive Briefing Center (2nd Floor) &lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPONSORS:&amp;amp;nbsp;[http://www.appsecconsulting.com/ Appsec Consulting],[http://www.cenzic.com/ Cenzic],[http://www.dasient.com/ Dasient], [http://www.sap.com/usa/about/company/saplabs/index.epx SAP&amp;amp;nbsp;Labs] &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''Drive By Downloads: How To Avoid Getting A Cap Popped In Your App:&amp;amp;nbsp;'''Which browser do you claim? What color is your screen-saver? It is a world wide hood out there, don’t let yourself become the next victim of a drive by… a drive by download. Email attachments have become synonymous with computer viruses and consumers have become accustom to questioning the legitimacy of email touting male enhancement drugs and lottery winnings. This means hackers are having to come up with new ways to distribute malware. Today, just by loading an infected webpage of from a legitimate website, a virus can be downloaded without any other interaction and will often go undetected. Once the virus is on a PC, hackers can access the computer remotely and steal sensitive information like banking passwords, send out spam or install more malicious executables. &lt;br /&gt;
&lt;br /&gt;
In this talk, we describe in technical detail the &amp;quot;anatomy of a modern web-based malware attack.&amp;quot; Web-based malware attacks have evolved significantly over the past 4 years. We present the state-of-the-art in web-based malware attacks and describe how the techniques used have evolved over time. '''&amp;lt;br&amp;gt;Bio - '''Neil Daswani is a co-founder of Dasient, Inc., a security company backed by some of the most influential investors in Silicon Valley and New York. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security). He has published extensively, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University. Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g. More information about Neil is available at http://www.neildaswani.com. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Building Secure Web Applications: ''' This presentation will go over core principles involved in launching secure web applications and effectively managing security in a cloud services environment. We will discuss best practices for implementing security programs, review examples of things done right and wrong, and address specific steps required for creating and maintaining a sustainable security framework for your web applications. &amp;lt;br&amp;gt;'''Bio '''- Misha Logvinov is the Vice President of Online Operations at IronKey. In this position, Mr. Logvinov and his team are responsible for designing, implementing and supporting a highly-scalable mission critical infrastructure for IronKey's next-generation security products and services. Mr. Logvinov brings to IronKey over a decade of management experience in information technology, operations and security. Throughout his career, he has been responsible for implementing hundreds of customer solutions, supporting millions of online users, managing complex backoffice applications and building some of the world's most secure online service environments. Prior to IronKey, Mr. Logvinov spent six years at Yodlee, one of the leading online financial service providers. He held various management roles during his tenure, most recently, as Director of Operations Delivery. Mr. Logvinov's earlier experiences included IT management at Outcome, Inc. and INTERSHOP Communications. Mr. Logvinov holds a BA in Business Administration from Plekhanov Russian Academy of Economics. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
'''Cloudy with a chance of a hack: '''Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud computing solutions out there - one of the main ones being security. Most of these solutions were built for ease of use and without necessarily security in mind. Companies should ask the solution provider the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. &amp;lt;br&amp;gt;'''Bio '''– Lars Ewe''': '''Chief Technology Officer and VP of Engineering for Cenzic. Lars Ewe is a technology executive with broad background in (web) application development and security, middleware infrastructure, software development and application/system manageability technologies. Throughout his career Lars has held key positions in engineering and product management in a variety of different markets. Prior to Cenzic, Lars was software development director at Advanced Micro Devices, Inc., responsible for AMD's overall systems manageability and related security strategy and all related engineering efforts. &lt;br /&gt;
&lt;br /&gt;
'''Application Security Deployment Tradeoffs:''' Application security tradeoffs and choices are made at various stages of application design, development and deployment. This talk will cover deployment aspects of application security. Based on experience in designing, developing and deploying application security solutions and products for the past 10 years, I will do a case study based analysis of security costs and tradeoffs. Specifically, we will correlate security choices during deployment with our observations regarding the relatively higher adoption of security features and products that have an incremental deployment plan over those that are more intrusive and/or are operationally more expensive. &amp;lt;br&amp;gt;'''Bio '''– Anoop Reddy Anoop Reddy has been working in Security and Application Firewalls for the past 8 years and has led many innovations as part of Teros and Citrix. He was the Architect and Technical Lead at Teros and now manages the Engineering Development for the Application Firewall product lines at Citrix. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MashSSL - '''Extending SSL for securing mashups: In this presentation we will describe MashSSL and how it can be used to solve a fundamental Internet security problem - when two web applications communicate through a potentially un-trusted user they do not have any standard way of mutually authenticating each other and establishing a trusted channel. MashSSL is a new multi-party protocol that has been expressly designed to inherit the security properties of SSL, and to be able to leverage its trust infrastructure. We will also discuss how this can be used to secure a variety of multi-party environments including mashups using Cross-domain XHR, OpenAJAX, as well as scenarios such as OpenID and OAuth. &amp;lt;br&amp;gt;'''Bio '''– Siddharth Bajaj is researching new technologies in the areas of Internet Trust, Identity and Authentication including how these can be applied to solve problems in verticals such as healthcare, online content and cloud computing. Siddharth has been with VeriSign since 1999 and has fulfilled variety of technical leadership roles. He was involved in the development of the VeriSign PKI services platform as well as the early conceptualization and architecture of more recent VeriSign products such as UA and VIP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== RSVP  ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84858</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84858"/>
				<updated>2010-06-13T23:28:46Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. &lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Bay Area Chapter - Application Security Summit &lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': SAP Offices, Palo Alto - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Venue and Directions:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto, Building 1 Executive Briefing Center (2nd Floor) &lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPONSORS:&amp;amp;nbsp;[http://www.appsecconsulting.com/ Appsec Consulting], [http://www.cenzic.com/ Cenzic], [http://www.dasient.com/ Dasient], and [http://www.sap.com/usa/about/company/saplabs/index.epx SAP&amp;amp;nbsp;Labs] &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''Drive By Downloads: How To Avoid Getting A Cap Popped In Your App:&amp;amp;nbsp;'''Which browser do you claim? What color is your screen-saver? It is a world wide hood out there, don’t let yourself become the next victim of a drive by… a drive by download. Email attachments have become synonymous with computer viruses and consumers have become accustom to questioning the legitimacy of email touting male enhancement drugs and lottery winnings. This means hackers are having to come up with new ways to distribute malware. Today, just by loading an infected webpage of from a legitimate website, a virus can be downloaded without any other interaction and will often go undetected. Once the virus is on a PC, hackers can access the computer remotely and steal sensitive information like banking passwords, send out spam or install more malicious executables. &lt;br /&gt;
&lt;br /&gt;
In this talk, we describe in technical detail the &amp;quot;anatomy of a modern web-based malware attack.&amp;quot; Web-based malware attacks have evolved significantly over the past 4 years. We present the state-of-the-art in web-based malware attacks and describe how the techniques used have evolved over time. '''&amp;lt;br&amp;gt;Bio - '''Neil Daswani is a co-founder of Dasient, Inc., a security company backed by some of the most influential investors in Silicon Valley and New York. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security). He has published extensively, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University. Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g. More information about Neil is available at http://www.neildaswani.com. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Building Secure Web Applications: ''' This presentation will go over core principles involved in launching secure web applications and effectively managing security in a cloud services environment. We will discuss best practices for implementing security programs, review examples of things done right and wrong, and address specific steps required for creating and maintaining a sustainable security framework for your web applications. &amp;lt;br&amp;gt;'''Bio '''- Misha Logvinov is the Vice President of Online Operations at IronKey. In this position, Mr. Logvinov and his team are responsible for designing, implementing and supporting a highly-scalable mission critical infrastructure for IronKey's next-generation security products and services. Mr. Logvinov brings to IronKey over a decade of management experience in information technology, operations and security. Throughout his career, he has been responsible for implementing hundreds of customer solutions, supporting millions of online users, managing complex backoffice applications and building some of the world's most secure online service environments. Prior to IronKey, Mr. Logvinov spent six years at Yodlee, one of the leading online financial service providers. He held various management roles during his tenure, most recently, as Director of Operations Delivery. Mr. Logvinov's earlier experiences included IT management at Outcome, Inc. and INTERSHOP Communications. Mr. Logvinov holds a BA in Business Administration from Plekhanov Russian Academy of Economics. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
'''Cloudy with a chance of a hack: '''Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud computing solutions out there - one of the main ones being security. Most of these solutions were built for ease of use and without necessarily security in mind. Companies should ask the solution provider the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. &amp;lt;br&amp;gt;'''Bio '''– Lars Ewe''': '''Chief Technology Officer and VP of Engineering for Cenzic. Lars Ewe is a technology executive with broad background in (web) application development and security, middleware infrastructure, software development and application/system manageability technologies. Throughout his career Lars has held key positions in engineering and product management in a variety of different markets. Prior to Cenzic, Lars was software development director at Advanced Micro Devices, Inc., responsible for AMD's overall systems manageability and related security strategy and all related engineering efforts. &lt;br /&gt;
&lt;br /&gt;
'''Application Security Deployment Tradeoffs:''' Application security tradeoffs and choices are made at various stages of application design, development and deployment. This talk will cover deployment aspects of application security. Based on experience in designing, developing and deploying application security solutions and products for the past 10 years, I will do a case study based analysis of security costs and tradeoffs. Specifically, we will correlate security choices during deployment with our observations regarding the relatively higher adoption of security features and products that have an incremental deployment plan over those that are more intrusive and/or are operationally more expensive. &amp;lt;br&amp;gt;'''Bio '''– Anoop Reddy Anoop Reddy has been working in Security and Application Firewalls for the past 8 years and has led many innovations as part of Teros and Citrix. He was the Architect and Technical Lead at Teros and now manages the Engineering Development for the Application Firewall product lines at Citrix. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MashSSL - '''Extending SSL for securing mashups: In this presentation we will describe MashSSL and how it can be used to solve a fundamental Internet security problem - when two web applications communicate through a potentially un-trusted user they do not have any standard way of mutually authenticating each other and establishing a trusted channel. MashSSL is a new multi-party protocol that has been expressly designed to inherit the security properties of SSL, and to be able to leverage its trust infrastructure. We will also discuss how this can be used to secure a variety of multi-party environments including mashups using Cross-domain XHR, OpenAJAX, as well as scenarios such as OpenID and OAuth. &amp;lt;br&amp;gt;'''Bio '''– Siddharth Bajaj is researching new technologies in the areas of Internet Trust, Identity and Authentication including how these can be applied to solve problems in verticals such as healthcare, online content and cloud computing. Siddharth has been with VeriSign since 1999 and has fulfilled variety of technical leadership roles. He was involved in the development of the VeriSign PKI services platform as well as the early conceptualization and architecture of more recent VeriSign products such as UA and VIP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== RSVP  ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84857</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84857"/>
				<updated>2010-06-13T23:27:53Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. &lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Bay Area Chapter - Application Security Summit &lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': SAP Offices, Palo Alto - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Venue and Directions:'''&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto, Building 1 Executive Briefing Center (2nd Floor) &lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPONSORS:&amp;amp;nbsp;[http://www.appsecconsulting.com/ Appsec Consulting], [[www.cenzic.com|Cenzic]], [http://www.dasient.com/ Dasient], and [http://www.sap.com/usa/about/company/saplabs/index.epx SAP&amp;amp;nbsp;Labs]&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''Drive By Downloads: How To Avoid Getting A Cap Popped In Your App:&amp;amp;nbsp;'''Which browser do you claim? What color is your screen-saver? It is a world wide hood out there, don’t let yourself become the next victim of a drive by… a drive by download. Email attachments have become synonymous with computer viruses and consumers have become accustom to questioning the legitimacy of email touting male enhancement drugs and lottery winnings. This means hackers are having to come up with new ways to distribute malware. Today, just by loading an infected webpage of from a legitimate website, a virus can be downloaded without any other interaction and will often go undetected. Once the virus is on a PC, hackers can access the computer remotely and steal sensitive information like banking passwords, send out spam or install more malicious executables. &lt;br /&gt;
&lt;br /&gt;
In this talk, we describe in technical detail the &amp;quot;anatomy of a modern web-based malware attack.&amp;quot; Web-based malware attacks have evolved significantly over the past 4 years. We present the state-of-the-art in web-based malware attacks and describe how the techniques used have evolved over time. '''&amp;lt;br&amp;gt;Bio - '''Neil Daswani is a co-founder of Dasient, Inc., a security company backed by some of the most influential investors in Silicon Valley and New York. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security). He has published extensively, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University. Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g. More information about Neil is available at http://www.neildaswani.com. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Building Secure Web Applications: ''' This presentation will go over core principles involved in launching secure web applications and effectively managing security in a cloud services environment. We will discuss best practices for implementing security programs, review examples of things done right and wrong, and address specific steps required for creating and maintaining a sustainable security framework for your web applications. &amp;lt;br&amp;gt;'''Bio '''- Misha Logvinov is the Vice President of Online Operations at IronKey. In this position, Mr. Logvinov and his team are responsible for designing, implementing and supporting a highly-scalable mission critical infrastructure for IronKey's next-generation security products and services. Mr. Logvinov brings to IronKey over a decade of management experience in information technology, operations and security. Throughout his career, he has been responsible for implementing hundreds of customer solutions, supporting millions of online users, managing complex backoffice applications and building some of the world's most secure online service environments. Prior to IronKey, Mr. Logvinov spent six years at Yodlee, one of the leading online financial service providers. He held various management roles during his tenure, most recently, as Director of Operations Delivery. Mr. Logvinov's earlier experiences included IT management at Outcome, Inc. and INTERSHOP Communications. Mr. Logvinov holds a BA in Business Administration from Plekhanov Russian Academy of Economics. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
'''Cloudy with a chance of a hack: '''Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud computing solutions out there - one of the main ones being security. Most of these solutions were built for ease of use and without necessarily security in mind. Companies should ask the solution provider the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. &amp;lt;br&amp;gt;'''Bio '''– Lars Ewe''': '''Chief Technology Officer and VP of Engineering for Cenzic. Lars Ewe is a technology executive with broad background in (web) application development and security, middleware infrastructure, software development and application/system manageability technologies. Throughout his career Lars has held key positions in engineering and product management in a variety of different markets. Prior to Cenzic, Lars was software development director at Advanced Micro Devices, Inc., responsible for AMD's overall systems manageability and related security strategy and all related engineering efforts. &lt;br /&gt;
&lt;br /&gt;
'''Application Security Deployment Tradeoffs:''' Application security tradeoffs and choices are made at various stages of application design, development and deployment. This talk will cover deployment aspects of application security. Based on experience in designing, developing and deploying application security solutions and products for the past 10 years, I will do a case study based analysis of security costs and tradeoffs. Specifically, we will correlate security choices during deployment with our observations regarding the relatively higher adoption of security features and products that have an incremental deployment plan over those that are more intrusive and/or are operationally more expensive. &amp;lt;br&amp;gt;'''Bio '''– Anoop Reddy Anoop Reddy has been working in Security and Application Firewalls for the past 8 years and has led many innovations as part of Teros and Citrix. He was the Architect and Technical Lead at Teros and now manages the Engineering Development for the Application Firewall product lines at Citrix. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MashSSL - '''Extending SSL for securing mashups: In this presentation we will describe MashSSL and how it can be used to solve a fundamental Internet security problem - when two web applications communicate through a potentially un-trusted user they do not have any standard way of mutually authenticating each other and establishing a trusted channel. MashSSL is a new multi-party protocol that has been expressly designed to inherit the security properties of SSL, and to be able to leverage its trust infrastructure. We will also discuss how this can be used to secure a variety of multi-party environments including mashups using Cross-domain XHR, OpenAJAX, as well as scenarios such as OpenID and OAuth. &amp;lt;br&amp;gt;'''Bio '''– Siddharth Bajaj is researching new technologies in the areas of Internet Trust, Identity and Authentication including how these can be applied to solve problems in verticals such as healthcare, online content and cloud computing. Siddharth has been with VeriSign since 1999 and has fulfilled variety of technical leadership roles. He was involved in the development of the VeriSign PKI services platform as well as the early conceptualization and architecture of more recent VeriSign products such as UA and VIP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== RSVP  ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84856</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84856"/>
				<updated>2010-06-13T23:23:48Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. &lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit &lt;br /&gt;
&lt;br /&gt;
WHEN: Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
WHERE: SAP Offices, Palo Alto - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto, Building 1 Executive Briefing Center (2nd Floor) &lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''Drive By Downloads: How To Avoid Getting A Cap Popped In Your App:&amp;amp;nbsp;'''Which browser do you claim? What color is your screen-saver? It is a world wide hood out there, don’t let yourself become the next victim of a drive by… a drive by download. Email attachments have become synonymous with computer viruses and consumers have become accustom to questioning the legitimacy of email touting male enhancement drugs and lottery winnings. This means hackers are having to come up with new ways to distribute malware. Today, just by loading an infected webpage of from a legitimate website, a virus can be downloaded without any other interaction and will often go undetected. Once the virus is on a PC, hackers can access the computer remotely and steal sensitive information like banking passwords, send out spam or install more malicious executables. &lt;br /&gt;
&lt;br /&gt;
In this talk, we describe in technical detail the &amp;quot;anatomy of a modern web-based malware attack.&amp;quot; Web-based malware attacks have evolved significantly over the past 4 years. We present the state-of-the-art in web-based malware attacks and describe how the techniques used have evolved over time. '''&amp;lt;br&amp;gt;Bio - '''Neil Daswani is a co-founder of Dasient, Inc., a security company backed by some of the most influential investors in Silicon Valley and New York. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security). He has published extensively, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University. Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g. More information about Neil is available at http://www.neildaswani.com. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Building Secure Web Applications: ''' This presentation will go over core principles involved in launching secure web applications and effectively managing security in a cloud services environment. We will discuss best practices for implementing security programs, review examples of things done right and wrong, and address specific steps required for creating and maintaining a sustainable security framework for your web applications. &amp;lt;br&amp;gt;'''Bio '''- Misha Logvinov is the Vice President of Online Operations at IronKey. In this position, Mr. Logvinov and his team are responsible for designing, implementing and supporting a highly-scalable mission critical infrastructure for IronKey's next-generation security products and services. Mr. Logvinov brings to IronKey over a decade of management experience in information technology, operations and security. Throughout his career, he has been responsible for implementing hundreds of customer solutions, supporting millions of online users, managing complex backoffice applications and building some of the world's most secure online service environments. Prior to IronKey, Mr. Logvinov spent six years at Yodlee, one of the leading online financial service providers. He held various management roles during his tenure, most recently, as Director of Operations Delivery. Mr. Logvinov's earlier experiences included IT management at Outcome, Inc. and INTERSHOP Communications. Mr. Logvinov holds a BA in Business Administration from Plekhanov Russian Academy of Economics. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
'''Cloudy with a chance of a hack: '''Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud computing solutions out there - one of the main ones being security. Most of these solutions were built for ease of use and without necessarily security in mind. Companies should ask the solution provider the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. &amp;lt;br&amp;gt;'''Bio '''– Lars Ewe''': '''Chief Technology Officer and VP of Engineering for Cenzic. Lars Ewe is a technology executive with broad background in (web) application development and security, middleware infrastructure, software development and application/system manageability technologies. Throughout his career Lars has held key positions in engineering and product management in a variety of different markets. Prior to Cenzic, Lars was software development director at Advanced Micro Devices, Inc., responsible for AMD's overall systems manageability and related security strategy and all related engineering efforts. &lt;br /&gt;
&lt;br /&gt;
'''Application Security Deployment Tradeoffs:''' Application security tradeoffs and choices are made at various stages of application design, development and deployment. This talk will cover deployment aspects of application security. Based on experience in designing, developing and deploying application security solutions and products for the past 10 years, I will do a case study based analysis of security costs and tradeoffs. Specifically, we will correlate security choices during deployment with our observations regarding the relatively higher adoption of security features and products that have an incremental deployment plan over those that are more intrusive and/or are operationally more expensive. &amp;lt;br&amp;gt;'''Bio '''– Anoop Reddy Anoop Reddy has been working in Security and Application Firewalls for the past 8 years and has led many innovations as part of Teros and Citrix. He was the Architect and Technical Lead at Teros and now manages the Engineering Development for the Application Firewall product lines at Citrix. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MashSSL - '''Extending SSL for securing mashups: In this presentation we will describe MashSSL and how it can be used to solve a fundamental Internet security problem - when two web applications communicate through a potentially un-trusted user they do not have any standard way of mutually authenticating each other and establishing a trusted channel. MashSSL is a new multi-party protocol that has been expressly designed to inherit the security properties of SSL, and to be able to leverage its trust infrastructure. We will also discuss how this can be used to secure a variety of multi-party environments including mashups using Cross-domain XHR, OpenAJAX, as well as scenarios such as OpenID and OAuth. &amp;lt;br&amp;gt;'''Bio '''– Siddharth Bajaj is researching new technologies in the areas of Internet Trust, Identity and Authentication including how these can be applied to solve problems in verticals such as healthcare, online content and cloud computing. Siddharth has been with VeriSign since 1999 and has fulfilled variety of technical leadership roles. He was involved in the development of the VeriSign PKI services platform as well as the early conceptualization and architecture of more recent VeriSign products such as UA and VIP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== RSVP  ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84855</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84855"/>
				<updated>2010-06-13T23:19:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers.&lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in.&lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit&lt;br /&gt;
&lt;br /&gt;
WHEN: Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
WHERE: SAP Offices, Palo Alto - See below for directions&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions:&lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto,&lt;br /&gt;
Building 1 &lt;br /&gt;
Executive  Briefing Center (2nd Floor)&lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
http://www.owasp.org/index.php?title=Bay_Area&amp;amp;action=edit&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt;&lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''Drive By Downloads: How To Avoid Getting A Cap Popped In Your App:&lt;br /&gt;
&lt;br /&gt;
Which browser do you claim? What color is your screen-saver? It is a world wide hood out there, don’t let yourself become the next victim of a drive by… a drive by download. &lt;br /&gt;
&lt;br /&gt;
Email attachments have become synonymous with computer viruses and consumers have become accustom to questioning the legitimacy of email touting male enhancement drugs and lottery winnings. This means hackers are having to come up with new ways to distribute malware. Today, just by loading an infected webpage of from a legitimate website, a virus can be downloaded without any other interaction and will often go undetected. Once the virus is on a PC, hackers can access the computer remotely and steal sensitive information like banking passwords, send out spam or install more malicious executables. &lt;br /&gt;
&lt;br /&gt;
In this talk, we describe in technical detail the &amp;quot;anatomy of a modern web-based malware attack.&amp;quot; Web-based malware attacks have evolved significantly over the past 4 years. We present the state-of-the-art in web-based malware attacks and describe how the techniques used have evolved over time.  '''&amp;lt;br&amp;gt;Bio - Neil Daswani is a co-founder of Dasient, Inc., a security company&lt;br /&gt;
backed by some of the most influential investors in Silicon Valley and New York. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security).  He has published extensively, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University. Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN&lt;br /&gt;
1590597842; http://tinyurl.com/33xs6g. More information about Neil is available at http://www.neildaswani.com.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Building Secure Web Applications:  This presentation will go over core principles involved in launching secure web applications and effectively managing security in a cloud services environment. We will discuss best practices for implementing security programs, review examples of things done right and wrong, and address specific steps required for creating and maintaining a sustainable security framework for your web applications. '''&amp;lt;br&amp;gt;Bio - Misha Logvinov is the Vice President of Online Operations at IronKey.  In this position, Mr. Logvinov and his team are responsible for designing, implementing and supporting a highly-scalable mission critical infrastructure for IronKey's next-generation security products and services. Mr. Logvinov brings to IronKey over a decade of management experience in information technology, operations and security. Throughout his career, he has been responsible for implementing hundreds of customer solutions, supporting millions of online users, managing complex backoffice applications and building some of the world's most secure online service environments. Prior to IronKey, Mr. Logvinov spent six years at Yodlee, one of the leading online financial service providers. He held various management roles during his tenure, most recently, as Director of Operations Delivery. Mr. Logvinov's earlier experiences included IT management at Outcome, Inc. and INTERSHOP Communications. Mr. Logvinov holds a BA in Business Administration from Plekhanov Russian Academy of Economics. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM).&lt;br /&gt;
&lt;br /&gt;
'''Cloudy with a chance of a hack:  Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud computing solutions out there - one of the main ones being security. Most of these solutions were built for ease of use and without necessarily security in mind. Companies should ask the solution provider the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. '''&amp;lt;br&amp;gt;Bio –  Lars Ewe''' Chief Technology Officer and VP of Engineering for Cenzic. Lars Ewe is a technology executive with broad background in (web) application development and security, middleware infrastructure, software development and application/system manageability technologies. Throughout his career Lars has held key positions in engineering and product management in a variety of different markets. Prior to Cenzic, Lars was software development director at Advanced Micro Devices, Inc., responsible for AMD's overall systems manageability and related security strategy and all related engineering efforts. &lt;br /&gt;
&lt;br /&gt;
'''Application Security Deployment Tradeoffs:  Application security tradeoffs and  choices are made at various stages of application design, development and deployment. This talk will cover deployment aspects of application security. Based on experience in designing, developing and deploying application security solutions and products for the past 10 years, I  will do a case study based analysis of security costs and tradeoffs. Specifically, we will correlate security choices during deployment with our observations regarding the relatively higher adoption of security features and products that have an incremental deployment plan over those that are more intrusive and/or are operationally more expensive. '''&amp;lt;br&amp;gt;Bio – Anoop Reddy'''  Anoop Reddy has been working in Security and Application Firewalls for the past 8 years and has led many innovations as part of Teros and Citrix. He was the Architect and Technical Lead at Teros and now manages the Engineering Development for the Application Firewall product lines at Citrix.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''MashSSL - Extending SSL for securing mashups:  In this presentation we will describe MashSSL and how it can be used to solve a fundamental Internet security problem - when two web applications communicate through a potentially un-trusted user they do not have any standard way of mutually authenticating each other and establishing a trusted channel. MashSSL is a new multi-party protocol that has been expressly designed to inherit the security properties of SSL, and to be able to leverage its trust infrastructure.  We will also discuss how this can be used to secure a variety of multi-party environments including mashups using Cross-domain XHR, OpenAJAX, as well as scenarios such as OpenID and OAuth. '''&amp;lt;br&amp;gt;Bio –  iddharth Bajaj''' Siddharth Bajaj is researching new technologies in the areas of Internet Trust, Identity and Authentication including how these can be applied to solve problems in verticals such as healthcare, online content and cloud computing. Siddharth has been with VeriSign since 1999 and has fulfilled variety of technical leadership roles. He was involved in the development of the VeriSign PKI services platform as well as the early conceptualization and architecture of more recent VeriSign products such as UA and VIP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84854</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84854"/>
				<updated>2010-06-13T23:13:15Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers.&lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in.&lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit&lt;br /&gt;
&lt;br /&gt;
WHEN: Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
WHERE: SAP Offices, Palo Alto - See below for directions&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions:&lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto,&lt;br /&gt;
Building 1 &lt;br /&gt;
Executive  Briefing Center (2nd Floor)&lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
http://www.owasp.org/index.php?title=Bay_Area&amp;amp;action=edit&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt;&lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''Drive By Downloads: How To Avoid Getting A Cap Popped In Your App:&lt;br /&gt;
&lt;br /&gt;
Which browser do you claim? What color is your screen-saver? It is a world wide hood out there, don’t let yourself become the next victim of a drive by… a drive by download. &lt;br /&gt;
&lt;br /&gt;
Email attachments have become synonymous with computer viruses and consumers have become accustom to questioning the legitimacy of email touting male enhancement drugs and lottery winnings. This means hackers are having to come up with new ways to distribute malware. Today, just by loading an infected webpage of from a legitimate website, a virus can be downloaded without any other interaction and will often go undetected. Once the virus is on a PC, hackers can access the computer remotely and steal sensitive information like banking passwords, send out spam or install more malicious executables. &lt;br /&gt;
&lt;br /&gt;
In this talk, we describe in technical detail the &amp;quot;anatomy of a modern web-based malware attack.&amp;quot; Web-based malware attacks have evolved significantly over the past 4 years. We present the state-of-the-art in web-based malware attacks and describe how the techniques used have evolved over time.  '''&amp;lt;br&amp;gt;Bio - Neil Daswani is a co-founder of Dasient, Inc., a security company&lt;br /&gt;
backed by some of the most influential investors in Silicon Valley and New York. In the past, Neil has served in a variety of research, development, teaching, and managerial roles at Google, Stanford University, DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security).  He has published extensively, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University. Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN&lt;br /&gt;
1590597842; http://tinyurl.com/33xs6g. More information about Neil is available at http://www.neildaswani.com.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Building Secure Web Applications: This presentation will go over core principles involved in launching secure web applications and effectively managing security in a cloud services environment. We will discuss best practices for implementing security programs, review examples of things done right and wrong, and address specific steps required for creating and maintaining a sustainable security framework for your web applications. '''&amp;lt;br&amp;gt;Bio - Misha Logvinov is the Vice President of Online Operations at IronKey. In this position, Mr. Logvinov and his team are responsible for designing, implementing and supporting a highly-scalable mission critical infrastructure for IronKey's next-generation security products and services. Mr. Logvinov brings to IronKey over a decade of management experience in information technology, operations and security. Throughout his career, he has been responsible for implementing hundreds of customer solutions, supporting millions of online users, managing complex backoffice applications and building some of the world's most secure online service environments. Prior to IronKey, Mr. Logvinov spent six years at Yodlee, one of the leading online financial service providers. He held various management roles during his tenure, most recently, as Director of Operations Delivery. Mr. Logvinov's earlier experiences included IT management at Outcome, Inc. and INTERSHOP Communications. Mr. Logvinov holds a BA in Business Administration from Plekhanov Russian Academy of Economics. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM).&lt;br /&gt;
&lt;br /&gt;
'''Cloudy with a chance of a hack: Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud computing solutions out there - one of the main ones being security. Most of these solutions were built for ease of use and without necessarily security in mind. Companies should ask the solution provider the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. '''&amp;lt;br&amp;gt;Bio – Lars Ewe''' Chief Technology Officer and VP of Engineering for Cenzic. Lars Ewe is a technology executive with broad background in (web) application development and security, middleware infrastructure, software development and application/system manageability technologies. Throughout his career Lars has held key positions in engineering and product management in a variety of different markets. Prior to Cenzic, Lars was software development director at Advanced Micro Devices, Inc., responsible for AMD's overall systems manageability and related security strategy and all related engineering efforts. &lt;br /&gt;
&lt;br /&gt;
'''Application Security Deployment Tradeoffs: Application security tradeoffs and  choices are made at various stages of application design, development and deployment. This talk will cover deployment aspects of application security. Based on experience in designing, developing and deploying application security solutions and products for the past 10 years, I  will do a case study based analysis of security costs and tradeoffs. Specifically, we will correlate security choices during deployment with our observations regarding the relatively higher adoption of security features and products that have an incremental deployment plan over those that are more intrusive and/or are operationally more expensive. '''&amp;lt;br&amp;gt;Bio – Anoop Reddy''' Anoop Reddy has been working in Security and Application Firewalls for the past 8 years and has led many innovations as part of Teros and Citrix. He was the Architect and Technical Lead at Teros and now manages the Engineering Development for the Application Firewall product lines at Citrix.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''MashSSL - Extending SSL for securing mashups: In this presentation we will describe MashSSL and how it can be used to solve a fundamental Internet security problem - when two web applications communicate through a potentially un-trusted user they do not have any standard way of mutually authenticating each other and establishing a trusted channel. MashSSL is a new multi-party protocol that has been expressly designed to inherit the security properties of SSL, and to be able to leverage its trust infrastructure.  We will also discuss how this can be used to secure a variety of multi-party environments including mashups using Cross-domain XHR, OpenAJAX, as well as scenarios such as OpenID and OAuth. '''&amp;lt;br&amp;gt;Bio – Siddharth Bajaj''' Siddharth Bajaj is researching new technologies in the areas of Internet Trust, Identity and Authentication including how these can be applied to solve problems in verticals such as healthcare, online content and cloud computing. Siddharth has been with VeriSign since 1999 and has fulfilled variety of technical leadership roles. He was involved in the development of the VeriSign PKI services platform as well as the early conceptualization and architecture of more recent VeriSign products such as UA and VIP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84853</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84853"/>
				<updated>2010-06-13T22:57:24Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers.&lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in.&lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit&lt;br /&gt;
&lt;br /&gt;
WHEN: Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
WHERE: SAP Offices, Palo Alto - See below for directions&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions:&lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto,&lt;br /&gt;
Building 1 &lt;br /&gt;
Executive  Briefing Center (2nd Floor)&lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
http://www.owasp.org/index.php?title=Bay_Area&amp;amp;action=edit&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 8:45 AM - 9:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, breakfast, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:00 AM - 9:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 9:15 AM - 10:00 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Drive By Downloads- How to Avoid Getting A Cap Popped in your App - Neil Daswani, Co-founder, Dasient&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:00 AM - 10:45 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Building Secure Web Applications In a Cloud Services Environment - Misha Logvinov, VP of Online Operations, IronKey‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10:45 AM - 11:15 AM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11:15 AM - Noon&amp;lt;br&amp;gt; &lt;br /&gt;
| Cloudy with a Chance of Hack - Lars Ewe, CTO and VP of Engineering, Cenzic‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Noon - 1:30 &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Lunch &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt;&lt;br /&gt;
| Application Security Deployment Tradeoffs - Anoop Reddy, Senior Manager, Products, Citrix&amp;lt;br&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| MashUp SSL - Extending SSL for Security Mashups - Siddharth Bajaj, Principal Engineer, Verisign &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84852</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84852"/>
				<updated>2010-06-13T22:51:09Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers.&lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in.&lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit&lt;br /&gt;
&lt;br /&gt;
WHEN: Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
WHERE: SAP Offices, Palo Alto - See below for directions&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions:&lt;br /&gt;
&lt;br /&gt;
3410 Hillview Ave, Palo Alto,&lt;br /&gt;
Building 1 &lt;br /&gt;
Executive  Briefing Center (2nd Floor)&lt;br /&gt;
&lt;br /&gt;
Directions on SAP Labs Web Site. Also on the Event Registration Page. &lt;br /&gt;
&lt;br /&gt;
Parking - You can park in the visitor parking or any of the open spaces at any level of the parking lot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbajuly2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley - [[File:Fujitsu-owasp-feb-10.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 4.45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
| Mini-Break&amp;lt;br&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 4.45 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84851</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=84851"/>
				<updated>2010-06-13T22:35:12Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local Jim Manico News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the SAP Offices in Palo Alto on July 1st, 2010. As usual attendance is free and food and beverages will be provided. This is an excellent event with great speakers and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
We have an excellent line-up of speakers.&lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. Badges will be ready for the registered attendees at the lobby where you will check in.&lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit&lt;br /&gt;
&lt;br /&gt;
WHEN: Thursday, July 1st, 2010 - From 9 A.M. to 3.00 P.M. &lt;br /&gt;
&lt;br /&gt;
WHERE: SAP Offices, Palo Alto - See below for directions&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley - [[File:Fujitsu-owasp-feb-10.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 4.45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
| Mini-Break&amp;lt;br&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 4.45 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84850</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84850"/>
				<updated>2010-06-13T22:19:15Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
*2010-02-25 &lt;br /&gt;
**Location: Fujitsu, Sunnyvale &lt;br /&gt;
**Speaker: Mandeep Khera, Bay Area Chapter Leader&amp;amp;nbsp;: Welcome Remarks and Overview of OWASP Bay Area- [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt‎]]&lt;br /&gt;
**Speakers: Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[Media:022510-OWASP-Keynote-KajYuecel-final.pdf]]&lt;br /&gt;
**Speaker: Dawn Song, Associate Professor, UC Berkeley - WebBlaze: New Techniques and Tools for Web Security - [[Media:Fujitsu-owasp-feb-10.pdf‎]]&lt;br /&gt;
**Speakers: Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford: State of the Art: Automated Black-Box Web app testing- - [[Media:Black Box Scanner Presentation.pdf‎]]&lt;br /&gt;
**Speaker: Richard Chow, PARC - Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - [[Media:Richard Chow OWASP 02252010.pdf]]&lt;br /&gt;
**Speakers: Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator: Mandeep Khera&lt;br /&gt;
&lt;br /&gt;
*2009-07-23 &lt;br /&gt;
**Location:Stanford University &lt;br /&gt;
**Speaker: Mandeep Khera&amp;amp;nbsp;: Welcome Remarks and Overview of OWASP Bay Area &lt;br /&gt;
**Speaker: Lars Ewe, CTO, Cenzic&amp;amp;nbsp;: Development Issues Within AJAX Applications: How to Divert Threats &lt;br /&gt;
**Speaker: Rob Jeronek, Intuit: Building a Corp App Security Assessment Program &lt;br /&gt;
**Speaker: Siva Ram, AppSec: Mastering Session Management &lt;br /&gt;
**Speaker: Brian Contos, Imperva: From Rivals to BFF: WAF &amp;amp;amp; VA Unite&lt;br /&gt;
&lt;br /&gt;
*2009-06-25 &lt;br /&gt;
**Location: San Francisco Federal Reserve Bank Office, San Francisco, CA &lt;br /&gt;
**Speaker: Jeremy Brotherton: Analyzing Web Malware &lt;br /&gt;
**Speaker: Dave Maynor: Mobile Device Security&lt;br /&gt;
&lt;br /&gt;
*2009-03-18 &lt;br /&gt;
**Location: Gap Inc, Conference Center C, 2 Folsom Street, San Francisco, CA 94105 &lt;br /&gt;
**Speaker: Brendan O’Conner: Back to the Future - Phishing and Malware &lt;br /&gt;
**Speaker: Kirk Greene: Testing Methodologies: White-box, Gray-Box, Black-box or Something Else&lt;br /&gt;
&lt;br /&gt;
*2008-12-11 &lt;br /&gt;
**Location: Network Meeting Center, TechMart Center, 5201 Great America Parkway, Santa Clara, CA 95054 &lt;br /&gt;
**Speaker: Brian Shura: Protecting Website Users from Each Other &lt;br /&gt;
**Speaker: Trey Ford: Making Money the Black Hat Way&lt;br /&gt;
&lt;br /&gt;
*2008-06-25 &lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043 &lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data] &lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter &lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises &lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery &lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security &lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21 &lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588 &lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.] &lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24 &lt;br /&gt;
**Location: PG&amp;amp;amp;E,245 Market Street, San Francisco, CA 94105 &lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp;amp; Flex® Applications &lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13 &lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA 94305 &lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br&amp;gt; &lt;br /&gt;
**Speaker: Adam Barth &amp;amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br&amp;gt; &lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84849</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84849"/>
				<updated>2010-06-13T22:18:06Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
*2010-02-25 &lt;br /&gt;
**Location: Fujitsu, Sunnyvale &lt;br /&gt;
**Speaker: Mandeep Khera, Bay Area Chapter Leader&amp;amp;nbsp;: Welcome Remarks and Overview of OWASP Bay Area- [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt‎]]&lt;br /&gt;
**Speakers: Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[Media:022510-OWASP-Keynote-KajYuecel-final.pdf]]&lt;br /&gt;
**Speaker: Dawn Song, Associate Professor, UC Berkeley - WebBlaze: New Techniques and Tools for Web Security - File:Fujitsu-owasp-feb-10.pdf‎ &lt;br /&gt;
**Speakers: Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford: State of the Art: Automated Black-Box Web app testing- - File:Black Box Scanner Presentation.pdf‎ &lt;br /&gt;
**Speaker: Richard Chow, PARC - Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - - File:Richard Chow OWASP 02252010.pdf &lt;br /&gt;
**Speakers: Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator: Mandeep Khera&lt;br /&gt;
&lt;br /&gt;
*2009-07-23 &lt;br /&gt;
**Location:Stanford University &lt;br /&gt;
**Speaker: Mandeep Khera&amp;amp;nbsp;: Welcome Remarks and Overview of OWASP Bay Area &lt;br /&gt;
**Speaker: Lars Ewe, CTO, Cenzic&amp;amp;nbsp;: Development Issues Within AJAX Applications: How to Divert Threats &lt;br /&gt;
**Speaker: Rob Jeronek, Intuit: Building a Corp App Security Assessment Program &lt;br /&gt;
**Speaker: Siva Ram, AppSec: Mastering Session Management &lt;br /&gt;
**Speaker: Brian Contos, Imperva: From Rivals to BFF: WAF &amp;amp;amp; VA Unite&lt;br /&gt;
&lt;br /&gt;
*2009-06-25 &lt;br /&gt;
**Location: San Francisco Federal Reserve Bank Office, San Francisco, CA &lt;br /&gt;
**Speaker: Jeremy Brotherton: Analyzing Web Malware &lt;br /&gt;
**Speaker: Dave Maynor: Mobile Device Security&lt;br /&gt;
&lt;br /&gt;
*2009-03-18 &lt;br /&gt;
**Location: Gap Inc, Conference Center C, 2 Folsom Street, San Francisco, CA 94105 &lt;br /&gt;
**Speaker: Brendan O’Conner: Back to the Future - Phishing and Malware &lt;br /&gt;
**Speaker: Kirk Greene: Testing Methodologies: White-box, Gray-Box, Black-box or Something Else&lt;br /&gt;
&lt;br /&gt;
*2008-12-11 &lt;br /&gt;
**Location: Network Meeting Center, TechMart Center, 5201 Great America Parkway, Santa Clara, CA 95054 &lt;br /&gt;
**Speaker: Brian Shura: Protecting Website Users from Each Other &lt;br /&gt;
**Speaker: Trey Ford: Making Money the Black Hat Way&lt;br /&gt;
&lt;br /&gt;
*2008-06-25 &lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043 &lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data] &lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter &lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises &lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery &lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security &lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21 &lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588 &lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.] &lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24 &lt;br /&gt;
**Location: PG&amp;amp;amp;E,245 Market Street, San Francisco, CA 94105 &lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp;amp; Flex® Applications &lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13 &lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA 94305 &lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br&amp;gt; &lt;br /&gt;
**Speaker: Adam Barth &amp;amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br&amp;gt; &lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84848</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84848"/>
				<updated>2010-06-13T22:13:03Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
*2010-02-25 &lt;br /&gt;
**Location: Fujitsu, Sunnyvale &lt;br /&gt;
**Speaker: Mandeep Khera, Bay Area Chapter Leader&amp;amp;nbsp;: Welcome Remarks and Overview of OWASP Bay Area- [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt‎]]&lt;br /&gt;
**Speakers: Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - File:022510-OWASP-Keynote-KajYuecel-final.pdf &lt;br /&gt;
**Speaker: Dawn Song, Associate Professor, UC Berkeley - WebBlaze: New Techniques and Tools for Web Security - File:Fujitsu-owasp-feb-10.pdf‎ &lt;br /&gt;
**Speakers: Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford: State of the Art: Automated Black-Box Web app testing- - File:Black Box Scanner Presentation.pdf‎ &lt;br /&gt;
**Speaker: Richard Chow, PARC - Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - - File:Richard Chow OWASP 02252010.pdf &lt;br /&gt;
**Speakers: Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator: Mandeep Khera&lt;br /&gt;
&lt;br /&gt;
*2009-07-23 &lt;br /&gt;
**Location:Stanford University &lt;br /&gt;
**Speaker: Mandeep Khera&amp;amp;nbsp;: Welcome Remarks and Overview of OWASP Bay Area &lt;br /&gt;
**Speaker: Lars Ewe, CTO, Cenzic&amp;amp;nbsp;: Development Issues Within AJAX Applications: How to Divert Threats &lt;br /&gt;
**Speaker: Rob Jeronek, Intuit: Building a Corp App Security Assessment Program &lt;br /&gt;
**Speaker: Siva Ram, AppSec: Mastering Session Management &lt;br /&gt;
**Speaker: Brian Contos, Imperva: From Rivals to BFF: WAF &amp;amp;amp; VA Unite&lt;br /&gt;
&lt;br /&gt;
*2009-06-25 &lt;br /&gt;
**Location: San Francisco Federal Reserve Bank Office, San Francisco, CA &lt;br /&gt;
**Speaker: Jeremy Brotherton: Analyzing Web Malware &lt;br /&gt;
**Speaker: Dave Maynor: Mobile Device Security&lt;br /&gt;
&lt;br /&gt;
*2009-03-18 &lt;br /&gt;
**Location: Gap Inc, Conference Center C, 2 Folsom Street, San Francisco, CA 94105 &lt;br /&gt;
**Speaker: Brendan O’Conner: Back to the Future - Phishing and Malware &lt;br /&gt;
**Speaker: Kirk Greene: Testing Methodologies: White-box, Gray-Box, Black-box or Something Else&lt;br /&gt;
&lt;br /&gt;
*2008-12-11 &lt;br /&gt;
**Location: Network Meeting Center, TechMart Center, 5201 Great America Parkway, Santa Clara, CA 95054 &lt;br /&gt;
**Speaker: Brian Shura: Protecting Website Users from Each Other &lt;br /&gt;
**Speaker: Trey Ford: Making Money the Black Hat Way&lt;br /&gt;
&lt;br /&gt;
*2008-06-25 &lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043 &lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data] &lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter &lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises &lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery &lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security &lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21 &lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588 &lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.] &lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24 &lt;br /&gt;
**Location: PG&amp;amp;amp;E,245 Market Street, San Francisco, CA 94105 &lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp;amp; Flex® Applications &lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13 &lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA 94305 &lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br&amp;gt; &lt;br /&gt;
**Speaker: Adam Barth &amp;amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br&amp;gt; &lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84847</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84847"/>
				<updated>2010-06-13T22:05:16Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
*2010-02-25 &lt;br /&gt;
**Location: Fujitsu, Sunnyvale &lt;br /&gt;
**Speaker: Mandeep Khera, Bay Area Chapter Leader&amp;amp;nbsp;: Welcome Remarks and Overview of OWASP Bay Area- &lt;br /&gt;
**Speakers: Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - File:022510-OWASP-Keynote-KajYuecel-final.pdf &lt;br /&gt;
**Speaker: Dawn Song, Associate Professor, UC Berkeley - WebBlaze: New Techniques and Tools for Web Security - File:Fujitsu-owasp-feb-10.pdf‎ &lt;br /&gt;
**Speakers: Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford: State of the Art: Automated Black-Box Web app testing- - File:Black Box Scanner Presentation.pdf‎ &lt;br /&gt;
**Speaker: Richard Chow, PARC - Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - - File:Richard Chow OWASP 02252010.pdf &lt;br /&gt;
**Speakers: Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator: Mandeep Khera&lt;br /&gt;
&lt;br /&gt;
*2009-07-23 &lt;br /&gt;
**Location:Stanford University &lt;br /&gt;
**Speaker: Mandeep Khera&amp;amp;nbsp;: Welcome Remarks and Overview of OWASP Bay Area &lt;br /&gt;
**Speaker: Lars Ewe, CTO, Cenzic&amp;amp;nbsp;: Development Issues Within AJAX Applications: How to Divert Threats &lt;br /&gt;
**Speaker: Rob Jeronek, Intuit: Building a Corp App Security Assessment Program &lt;br /&gt;
**Speaker: Siva Ram, AppSec: Mastering Session Management &lt;br /&gt;
**Speaker: Brian Contos, Imperva: From Rivals to BFF: WAF &amp;amp;amp; VA Unite&lt;br /&gt;
&lt;br /&gt;
*2009-06-25 &lt;br /&gt;
**Location: San Francisco Federal Reserve Bank Office, San Francisco, CA &lt;br /&gt;
**Speaker: Jeremy Brotherton: Analyzing Web Malware &lt;br /&gt;
**Speaker: Dave Maynor: Mobile Device Security&lt;br /&gt;
&lt;br /&gt;
*2009-03-18 &lt;br /&gt;
**Location: Gap Inc, Conference Center C, 2 Folsom Street, San Francisco, CA 94105 &lt;br /&gt;
**Speaker: Brendan O’Conner: Back to the Future - Phishing and Malware &lt;br /&gt;
**Speaker: Kirk Greene: Testing Methodologies: White-box, Gray-Box, Black-box or Something Else&lt;br /&gt;
&lt;br /&gt;
*2008-12-11 &lt;br /&gt;
**Location: Network Meeting Center, TechMart Center, 5201 Great America Parkway, Santa Clara, CA 95054 &lt;br /&gt;
**Speaker: Brian Shura: Protecting Website Users from Each Other &lt;br /&gt;
**Speaker: Trey Ford: Making Money the Black Hat Way&lt;br /&gt;
&lt;br /&gt;
*2008-06-25 &lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043 &lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data] &lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter &lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises &lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery &lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security &lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21 &lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588 &lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.] &lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24 &lt;br /&gt;
**Location: PG&amp;amp;amp;E,245 Market Street, San Francisco, CA 94105 &lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp;amp; Flex® Applications &lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13 &lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA 94305 &lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br&amp;gt; &lt;br /&gt;
**Speaker: Adam Barth &amp;amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br&amp;gt; &lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84846</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84846"/>
				<updated>2010-06-13T21:43:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
* 2010-02-25&lt;br /&gt;
** Location: Fujitsu, Sunnyvale&lt;br /&gt;
** Speaker: Mandeep Khera, Bay Area Chapter Leader : Welcome Remarks and Overview of OWASP Bay Area - [[Media:Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt‎]]&lt;br /&gt;
** Speakers: Keynote - Kaj van de Loo, SVP Platforms &amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - File:022510-OWASP-Keynote-KajYuecel-final.pdf&lt;br /&gt;
** Speaker: Dawn Song, Associate Professor, UC Berkeley - WebBlaze: New Techniques and Tools for Web Security - File:Fujitsu-owasp-feb-10.pdf‎&lt;br /&gt;
** Speakers: Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford: State of the Art: Automated Black-Box Web app testing-  - File:Black Box Scanner Presentation.pdf‎&lt;br /&gt;
** Speaker: Richard Chow, PARC - Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control -  - File:Richard Chow OWASP 02252010.pdf&lt;br /&gt;
** Speakers: Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator: Mandeep Khera &lt;br /&gt;
&lt;br /&gt;
*2009-07-23&lt;br /&gt;
** Location:Stanford University &lt;br /&gt;
** Speaker: Mandeep Khera : Welcome Remarks and Overview of OWASP Bay Area &lt;br /&gt;
** Speaker: Lars Ewe, CTO, Cenzic : Development Issues Within AJAX Applications: How to Divert Threats  &lt;br /&gt;
** Speaker: Rob Jeronek, Intuit: Building a Corp App Security Assessment Program &lt;br /&gt;
** Speaker: Siva Ram, AppSec: Mastering Session Management  &lt;br /&gt;
** Speaker: Brian Contos, Imperva: From Rivals to BFF: WAF &amp;amp; VA Unite  &lt;br /&gt;
&lt;br /&gt;
*2009-06-25&lt;br /&gt;
**Location: San Francisco Federal Reserve Bank Office, San Francisco, CA &lt;br /&gt;
**Speaker: Jeremy Brotherton: Analyzing Web Malware&lt;br /&gt;
**Speaker: Dave Maynor: Mobile Device Security&lt;br /&gt;
&lt;br /&gt;
*2009-03-18&lt;br /&gt;
**Location: Gap Inc, Conference Center C, 2 Folsom Street, San Francisco, CA 94105&lt;br /&gt;
**Speaker: Brendan O’Conner: Back to the Future - Phishing and Malware&lt;br /&gt;
**Speaker: Kirk Greene: Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else&lt;br /&gt;
&lt;br /&gt;
*2008-12-11&lt;br /&gt;
**Location: Network Meeting Center, TechMart Center, 5201 Great America Parkway, Santa Clara, CA 95054 &lt;br /&gt;
**Speaker: Brian Shura: Protecting Website Users from Each Other&lt;br /&gt;
**Speaker: Trey Ford: Making Money the Black Hat Way&lt;br /&gt;
&lt;br /&gt;
*2008-06-25&lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043&lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data]&lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter&lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises&lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery&lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security&lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.]&lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84845</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84845"/>
				<updated>2010-06-13T21:43:06Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
* 2010-02-25&lt;br /&gt;
** Location: Fujitsu, Sunnyvale&lt;br /&gt;
** Speaker: Mandeep Khera, Bay Area Chapter Leader : Welcome Remarks and Overview of OWASP Bay Area - Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt‎&lt;br /&gt;
** Speakers: Keynote - Kaj van de Loo, SVP Platforms &amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - File:022510-OWASP-Keynote-KajYuecel-final.pdf&lt;br /&gt;
** Speaker: Dawn Song, Associate Professor, UC Berkeley - WebBlaze: New Techniques and Tools for Web Security - File:Fujitsu-owasp-feb-10.pdf‎&lt;br /&gt;
** Speakers: Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford: State of the Art: Automated Black-Box Web app testing-  - File:Black Box Scanner Presentation.pdf‎&lt;br /&gt;
** Speaker: Richard Chow, PARC - Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control -  - File:Richard Chow OWASP 02252010.pdf&lt;br /&gt;
** Speakers: Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator: Mandeep Khera &lt;br /&gt;
&lt;br /&gt;
*2009-07-23&lt;br /&gt;
** Location:Stanford University &lt;br /&gt;
** Speaker: Mandeep Khera : Welcome Remarks and Overview of OWASP Bay Area &lt;br /&gt;
** Speaker: Lars Ewe, CTO, Cenzic : Development Issues Within AJAX Applications: How to Divert Threats  &lt;br /&gt;
** Speaker: Rob Jeronek, Intuit: Building a Corp App Security Assessment Program &lt;br /&gt;
** Speaker: Siva Ram, AppSec: Mastering Session Management  &lt;br /&gt;
** Speaker: Brian Contos, Imperva: From Rivals to BFF: WAF &amp;amp; VA Unite  &lt;br /&gt;
&lt;br /&gt;
*2009-06-25&lt;br /&gt;
**Location: San Francisco Federal Reserve Bank Office, San Francisco, CA &lt;br /&gt;
**Speaker: Jeremy Brotherton: Analyzing Web Malware&lt;br /&gt;
**Speaker: Dave Maynor: Mobile Device Security&lt;br /&gt;
&lt;br /&gt;
*2009-03-18&lt;br /&gt;
**Location: Gap Inc, Conference Center C, 2 Folsom Street, San Francisco, CA 94105&lt;br /&gt;
**Speaker: Brendan O’Conner: Back to the Future - Phishing and Malware&lt;br /&gt;
**Speaker: Kirk Greene: Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else&lt;br /&gt;
&lt;br /&gt;
*2008-12-11&lt;br /&gt;
**Location: Network Meeting Center, TechMart Center, 5201 Great America Parkway, Santa Clara, CA 95054 &lt;br /&gt;
**Speaker: Brian Shura: Protecting Website Users from Each Other&lt;br /&gt;
**Speaker: Trey Ford: Making Money the Black Hat Way&lt;br /&gt;
&lt;br /&gt;
*2008-06-25&lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043&lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data]&lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter&lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises&lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery&lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security&lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.]&lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84844</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=84844"/>
				<updated>2010-06-13T21:39:11Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
* 2010-02-25&lt;br /&gt;
** Location: Fujitsu, Sunnyvale&lt;br /&gt;
** &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*2009-07-23&lt;br /&gt;
** Location:Stanford University &lt;br /&gt;
** Speaker: Mandeep Khera : Welcome Remarks and Overview of OWASP Bay Area &lt;br /&gt;
** Speaker: Lars Ewe, CTO, Cenzic : Development Issues Within AJAX Applications: How to Divert Threats  &lt;br /&gt;
** Speaker: Rob Jeronek, Intuit: Building a Corp App Security Assessment Program &lt;br /&gt;
** Speaker: Siva Ram, AppSec: Mastering Session Management  &lt;br /&gt;
** Speaker: Brian Contos, Imperva: From Rivals to BFF: WAF &amp;amp; VA Unite  &lt;br /&gt;
&lt;br /&gt;
*2009-06-25&lt;br /&gt;
**Location: San Francisco Federal Reserve Bank Office, San Francisco, CA &lt;br /&gt;
**Speaker: Jeremy Brotherton: Analyzing Web Malware&lt;br /&gt;
**Speaker: Dave Maynor: Mobile Device Security&lt;br /&gt;
&lt;br /&gt;
*2009-03-18&lt;br /&gt;
**Location: Gap Inc, Conference Center C, 2 Folsom Street, San Francisco, CA 94105&lt;br /&gt;
**Speaker: Brendan O’Conner: Back to the Future - Phishing and Malware&lt;br /&gt;
**Speaker: Kirk Greene: Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else&lt;br /&gt;
&lt;br /&gt;
*2008-12-11&lt;br /&gt;
**Location: Network Meeting Center, TechMart Center, 5201 Great America Parkway, Santa Clara, CA 95054 &lt;br /&gt;
**Speaker: Brian Shura: Protecting Website Users from Each Other&lt;br /&gt;
**Speaker: Trey Ford: Making Money the Black Hat Way&lt;br /&gt;
&lt;br /&gt;
*2008-06-25&lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043&lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data]&lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter&lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises&lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery&lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security&lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.]&lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=80382</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=80382"/>
				<updated>2010-03-23T20:46:18Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley - [[File:Fujitsu-owasp-feb-10.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 4.45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
| Mini-Break&amp;lt;br&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 4.45 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fujitsu-owasp-feb-10.pdf&amp;diff=80381</id>
		<title>File:Fujitsu-owasp-feb-10.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fujitsu-owasp-feb-10.pdf&amp;diff=80381"/>
				<updated>2010-03-23T20:45:04Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79892</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79892"/>
				<updated>2010-03-13T00:41:55Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 4.45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
| Mini-Break&amp;lt;br&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 4.45 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79890</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79890"/>
				<updated>2010-03-13T00:40:49Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 4.45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
| Mini-Break&amp;lt;br&amp;gt;&lt;br /&gt;
| 4.45 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79889</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79889"/>
				<updated>2010-03-13T00:39:10Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
  4.30 PM - 4.45 PM - Mini-Break &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.45 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79888</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79888"/>
				<updated>2010-03-13T00:38:16Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
  4.30 PM - 4.45 PM - Mini-Break &lt;br /&gt;
|-&lt;br /&gt;
| 4.45 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79887</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79887"/>
				<updated>2010-03-13T00:36:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
4.30 PM - 4.45 PM - Mini-Break &lt;br /&gt;
|-&lt;br /&gt;
| 4.45 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79886</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79886"/>
				<updated>2010-03-13T00:36:00Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  4.30 PM - 4.45 PM - Mini-Break &lt;br /&gt;
|-&lt;br /&gt;
| 4.45 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79885</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79885"/>
				<updated>2010-03-13T00:32:51Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford - [[File:Black_Box_Scanner_Presentation.pdf]]‎&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 5.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| TBD - Praveen Murthy, Fujitsu &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 5.00 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Black_Box_Scanner_Presentation.pdf&amp;diff=79884</id>
		<title>File:Black Box Scanner Presentation.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Black_Box_Scanner_Presentation.pdf&amp;diff=79884"/>
				<updated>2010-03-13T00:31:49Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79883</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79883"/>
				<updated>2010-03-13T00:31:34Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC - [[File:022510-OWASP-Keynote-KajYuecel-final.pdf‎]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 5.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| TBD - Praveen Murthy, Fujitsu &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 5.00 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:022510-OWASP-Keynote-KajYuecel-final.pdf&amp;diff=79882</id>
		<title>File:022510-OWASP-Keynote-KajYuecel-final.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:022510-OWASP-Keynote-KajYuecel-final.pdf&amp;diff=79882"/>
				<updated>2010-03-13T00:30:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79881</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79881"/>
				<updated>2010-03-13T00:30:03Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC - [[File:Richard_Chow_OWASP_02252010.pdf‎]]  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 5.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| TBD - Praveen Murthy, Fujitsu &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 5.00 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Richard_Chow_OWASP_02252010.pdf&amp;diff=79880</id>
		<title>File:Richard Chow OWASP 02252010.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Richard_Chow_OWASP_02252010.pdf&amp;diff=79880"/>
				<updated>2010-03-13T00:28:50Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79879</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79879"/>
				<updated>2010-03-13T00:27:47Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:Welcome_Remarks_and_Overview_of_OWASP_Bay_Area_-_Mandeep_Khera,_Bay_Area_Chapter_Leader.ppt]]‎ &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 5.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| TBD - Praveen Murthy, Fujitsu &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 5.00 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79878</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79878"/>
				<updated>2010-03-13T00:26:35Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[File:File:OWASP Mandeep Khera BA FEb10.ppt]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 5.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| TBD - Praveen Murthy, Fujitsu &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 5.00 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79877</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79877"/>
				<updated>2010-03-13T00:25:46Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [File:OWASP Mandeep Khera BA FEb10.ppt]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 5.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| TBD - Praveen Murthy, Fujitsu &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 5.00 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79876</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79876"/>
				<updated>2010-03-13T00:25:14Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[[File:File:OWASP Mandeep Khera BA FEb10.ppt]]]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 5.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| TBD - Praveen Murthy, Fujitsu &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 5.00 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79874</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=79874"/>
				<updated>2010-03-13T00:24:23Z</updated>
		
		<summary type="html">&lt;p&gt;Mandeep Khera: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location ==&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next Application Security Summit at the Fujitsu Offices in Sunnyvale on February 25th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security. We have an excellent line-up of speakers. &lt;br /&gt;
&lt;br /&gt;
Please note that due to security issues, your must pre-register. The registration will ask you for citizenship/permanent residence status as well. Badges will be ready for the registered attendees at the lobby where you will check in. &lt;br /&gt;
&lt;br /&gt;
WHAT: OWASP Bay Area Chapter - Application Security Summit WHEN: Thursday, February 25th, 2010 - From 1 P.M. to 8.00 P.M. (including a reception from 6.30 to 8.00) &lt;br /&gt;
&lt;br /&gt;
WHERE: Fujitsu Offices, Sunnyvale - See below for directions &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue and Directions: &lt;br /&gt;
&lt;br /&gt;
Fujitsu Sunnyvale Campus (Building H) 1250 E. Arques Avenue Sunnyvale, CA 94085 &lt;br /&gt;
&lt;br /&gt;
Fujitsu Policy&amp;amp;nbsp;: Please note that you will be asked to sign and write down your country of citizenship in order to comply with US Customs regulations and C/TPAT (Customs Trade Partnership Against Terrorism) certifications. As part of the compliance, we regrettably are not able to allow attendance to those who hold the citizenship of Cuba, Iran, North Korea, Sudan, or Syria without a US Green Card. We sincerely apologize for any inconvenience this may cause. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED &lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 1021px; height: 373px;&amp;quot;&lt;br /&gt;
|+ Agenda &lt;br /&gt;
|-&lt;br /&gt;
| 1.00 PM - 1.15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Check-in, registration, networking&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:15 PM - 1:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Welcome Remarks and Overview of OWASP Bay Area - Mandeep Khera, Bay Area Chapter Leader [[Media:File:OWASP Mandeep Khera BA FEb10.ppt]]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 1:30 PM - 2:15 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Keynote - Kaj van de Loo, SVP Platforms &amp;amp;amp; On Demand, SAP and Yuecel Karabulut, PH.D., Chief Security Advisor 7 Head of Security Strategy, SAP Labs, LLC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 2:15 PM - 3:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| WebBlaze: New Techniques and Tools for Web Security - Dawn Song, Associate Professor, UC Berkeley&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:00 PM - 3:30 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Break, refreshments&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 3:30 PM - 4:00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| State of the Art: Automated Black-Box Web app testing- Prof. John Mitchell, Stanford University and Jason Bau, PH.D. Student, Stanford &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4:00 PM - 4:30 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control - Richard Chow, PARC&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 4.30 PM - 5.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| TBD - Praveen Murthy, Fujitsu &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 5.00 PM - 6.00 PM&amp;lt;br&amp;gt; &lt;br /&gt;
| Panel - App Security issues - Cloud Security, Inertia with App Security, Future of App Security - Q&amp;amp;amp;A from the audience - Panelists: Prof Dawn Song; Richard Chow; Lars Ewe, CTO; Cenzic Moderator:&amp;amp;nbsp;Mandeep Khera &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 6.00 PM - 8.00 PM &amp;lt;br&amp;gt; &lt;br /&gt;
| Networking Reception - Dinner and Drinks! &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Detailed Abstracts and Speaker Bios &lt;br /&gt;
&lt;br /&gt;
'''WebBlaze: New Techniques and Tools for Web Security''' I will present the WebBlaze project, aiming at designing and developing new techniques and tools to improve web security. WebBlaze's new technologies cover a broad range including new architectural solutions for defending against cross-site scripting attacks, tools for detecting and defending against cross-origin JavaScript capability leaks which lead to universal cross-site scripting attacks, and new approaches for secure browser extensions and web advertisements. In this talk, I will focus on two sample techniques in WebBlaze: (1) dynamic analysis and symbolic reasoning of JavaScript to detect client-side input validation vulnerabilities; (2) program binary analysis to extract security-related models from browsers to detect new classes of vulnerabilities such as content-sniffing vulnerabilities. Our techniques and tools have discovered previously unknown vulnerabilities in browsers and popular web applications. Some of the solutions in WebBlaze have been adopted by mainstream browsers and industry standards and deployed on millions of machines. '''&amp;lt;br&amp;gt;Bio – Prof. Dawn Song''' Dawn Song is an Associate Professor in the department of Electrical Engineering and Computer Science at University of California, Berkeley. She obtained her B.S. in Physics from Tsinghua University in China in 1996, her M.S. in Computer Science from Carnegie Mellon University in 1999, and her Ph.D. in Computer Science from UC Berkeley in 2002. Prior to joining UC Berkeley, she was an Assistant Professor at Carnegie Mellon University from 2002 to 2007. Her research interest lies in security and privacy issues in computer systems and networks, including areas ranging from software security, networking security, database security, distributed systems security, to applied cryptography. She is the recipient of various awards including the NSF CAREER Award, the Alfred P. Sloan Research Fellowship Award, the IBM Faculty Award, the George Tallman Ladd Research Award, the Okawa Foundation Research Award, and the Li Ka Shing Foundation Women in Science Distinguished Lecture Series Award. She is also the author of multiple award papers in top security conferences, including the Best Paper Award at the USENIX Security Symposium and the Highest Ranked Paper Award at the IEEE Symposium on Security and Privacy. Recently she was awarded the MIT Technology Review TR-35 Award, recognizing her as one of the world's top innovators under the age of 35. &lt;br /&gt;
&lt;br /&gt;
'''State of the Art: Automated Black-Box Web app testing''' &lt;br /&gt;
&lt;br /&gt;
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, we obtained access to eight leading tools and carried out a study of: (i) the class of vulnerabilities tested by these scanners, (ii) their effectiveness against target vulnerabilities, and (iii) the relevance of the target vulnerabilities to vulnerabilities found in the wild. To conduct our study we used a custom web application vulnerable to known and projected vulnerabilities, and previous versions of widely used web applications containing known vulnerabilities. Our results show the promise and effectiveness of automated tools, as a group, and also some limitations. In particular, “stored” forms of Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities are not currently found by many tools. Because our goal is to assess the potential of future research, not to evaluate specific vendors, we will not report comparative data or make any recommendations about purchase of specific tools. &amp;lt;br&amp;gt;'''Bio – Prof. John Mitchell''' John Mitchell is the Mary and Gordon Crary Family Professor in the Stanford Computer Science Department. His research in computer security focuses on web security, network security, privacy, and distributed authorization management. He has also worked on programming language analysis and design, formal methods, and applications of mathematical logic to computer science. Prof. Mitchell currently leads research projects funded by the US Air Force, the Office of Naval Research, private companies and foundations, and he is the Stanford Principal Investigator of the multidisciplinary TRUST NSF Science and Technology Center. He is a consultant and advisor to a number of companies and is the author of over 140 research articles and two books. &lt;br /&gt;
&lt;br /&gt;
'''Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control''' Cloud computing is clearly one of today's most enticing technology areas. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this survey talk, we characterize the problems and their impact on adoption. In addition, we describe some existing research thrusts with the potential to alleviate some of the concerns impeding adoption. '''&amp;lt;br&amp;gt;Bio – Richard Chow''' Richard Chow works in the security and privacy group at the Palo Alto Research Center. Richard is interested in systems security, fraud detection, and privacy. Some of his achievements include architecting Yahoo!'s click-fraud protection system and the security and DRM components for Motorola's first Java-based phone platform. He has played a lead role at three startups and was also a founder of Trusted Systems Laboratories, which brought high-assurance security systems to the commercial market. Richard received his Ph.D. in Mathematics from UCLA.&lt;br /&gt;
&lt;br /&gt;
== RSVP ==&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://owaspbayarea-feb2010.eventbrite.com/ &lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Mandeep Khera</name></author>	</entry>

	</feed>