<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mdontamsetti</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mdontamsetti"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Mdontamsetti"/>
		<updated>2026-05-15T15:15:58Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37621</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37621"/>
				<updated>2008-08-29T17:24:57Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt; Scroll down to see speaker agenda, and training options &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor]  - [http://www.cenzic.com https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - &lt;br /&gt;
[http://www.fishnetsecurity.com https://www.owasp.org/images/4/4a/Fishnet_security.png] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] -[http://www.barracudanetworks.com/ https://www.owasp.org/images/a/a2/Barracuda_Color_Logo.jpg] ~ [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 Members / $400 Non-Members / $200 for Students.  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
OWASP NYC's conference offers tracks for security and development professionals interested in learning how to secure applications and enterprises as well as organization leaders who want to learn more about the state of the appsec industry and its trends.  With two days of training and two days of sessions discussing cutting edge research presented by some of the brightest people in the industry, this event is a must attend for anyone looking to improve their information security posture. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008 &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Doors Open for Attendee/Speaker Registration &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#Technology_Pavilion_-_September_24th_and_25th Exhibit/Sponsor Area]'''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, where we are.. where we are going &lt;br /&gt;
''OWASP Foundation: [http://www.owasp.org/index.php/Contact Jeff Williams], [http://www.owasp.org/index.php/Contact Dinis Cruz], [http://www.owasp.org/index.php/Contact Dave Wichers], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.owasp.org/index.php/Contact Sebastien Deleersnyder], [http://www.owasp.org/index.php/Contact Paulo Coimbra], [http://www.owasp.org/index.php/Contact Kate Hartmann], [http://www.owasp.org/index.php/Contact Alison Shrader] &amp;amp; [http://www.owasp.org/index.php/Category:OWASP_Chapter#Chapter_Support_Materials all local chapter leaders]&lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-rohit-sethi Rohit Sethi] &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni Sahba Kazerooni]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Critical exploits... let us count the ways&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen],''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, [http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital, &amp;lt;br&amp;gt; [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Wild_Wild_Web_on_Security_Planet Wild Wild Web on Security Planet]&lt;br /&gt;
''[http://www.securisksolutions.com/company/execmgt.aspx Mano Paul]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |Shhhh Don’t Tell Anybody &lt;br /&gt;
''[http://www.linkedin.com/in/ppetkov Petko D. Petkov]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af - A Framework to own the web]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar Dr. B. V. Kumar] &amp;amp; [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav Mr. Abhay Bhargav]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP NYC AppSec 2008 VIP Party&lt;br /&gt;
''Location: TBD''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008 &lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Software Development: The Last Security Frontier&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior&lt;br /&gt;
Executive Director and member of the Board of Directors, (ISC)²''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls Best Practices Guide: Web Application Firewalls]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' &amp;amp; ''[http://www.linkedin.com/in/steveantoniewicz Steve Antoniewicz]''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html APPSEC Red/Tiger Team Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lets talk about OWASP....&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Industry Analyst with Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security Research Report&lt;br /&gt;
''[http://www.linkedin.com/pub/5/742/233 Dinis Cruz]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Get Rich or Die Trying - Making Money on The Web, The Black Hat Way&lt;br /&gt;
''Trey Ford, Tom Brennan, Jeremiah Grossman''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [https://www.owasp.org/index.php/User_talk:Jian Lotus Notes/Domino Web Application Security]&lt;br /&gt;
''[https://www.owasp.org/index.php/User_talk:Jian Jian Hui Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The Owasp Orizon Project: towards version 1.0]&lt;br /&gt;
[https://www.owasp.org/index.php/User:Thesp0nge Paolo Perego]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Building_Usable_Security Building Usable Security]&lt;br /&gt;
[http://www.owasp.org/index.php/Zed_Abbadi Zed Abbadi]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Input_validation:_the_Good%2C_the_Bad_and_the_Ugly Input validation: the Good, the Bad and the Ugly]&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-vadim-okun Vadim Okun]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Wizdom of Crowds / CTF Awards &amp;amp; Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th. 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CPE Credits ==&lt;br /&gt;
&lt;br /&gt;
Much of the content is eligible for CPE credits.  Please check with your institution regarding specific requirements.&lt;br /&gt;
&lt;br /&gt;
'''The CISM cpe policy (www.isaca.org/cismcpepolicy) states''': &lt;br /&gt;
&lt;br /&gt;
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.&lt;br /&gt;
&lt;br /&gt;
Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Earn (ISC)2 CPE Credits at 2008 OWASP USA, NYC'''&lt;br /&gt;
&lt;br /&gt;
Attendance at the 2008 OWASP NYC Training Courses or Conferences will earn you Continuing Professional Education (CPE) credits as follows:&lt;br /&gt;
Training Courses: September 22-23, 2008&lt;br /&gt;
•	16 CPE units for 2 days of training (Monday - Tuesday) &lt;br /&gt;
•	8 CPE units for 1 day of training (Monday or Tuesday Only) &lt;br /&gt;
Conferences: September 24-25, 2008&lt;br /&gt;
Earn 1 CPE per hour of conference attendance&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Dave Wichers: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Eric Sheridan: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: John Pavone: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: Arshan Dabirsiaghi: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Conlultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotels in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37620</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37620"/>
				<updated>2008-08-29T17:23:54Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt; Scroll down to see speaker agenda, and training options &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor]  - [http://www.cenzic.com https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - &lt;br /&gt;
[http://www.fishnetsecurity.com https://www.owasp.org/images/4/4a/Fishnet_security.png] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] -[http://www.barracudanetworks.com/ https://www.owasp.org/images/a/a2/Barracuda_Color_Logo.jpg] ~ [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 Members / $400 Non-Members / $200 for Students.  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
OWASP NYC's conference offers tracks for security and development professionals interested in learning how to secure applications and enterprises as well as organization leaders who want to learn more about the state of the appsec industry and its trends.  With two days of training and two days of sessions discussing cutting edge research presented by some of the brightest people in the industry, this event is a must attend for anyone looking to improve their information security posture. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008 &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Doors Open for Attendee/Speaker Registration &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#Technology_Pavilion_-_September_24th_and_25th Exhibit/Sponsor Area]'''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, where we are.. where we are going &lt;br /&gt;
''OWASP Foundation: [http://www.owasp.org/index.php/Contact Jeff Williams], [http://www.owasp.org/index.php/Contact Dinis Cruz], [http://www.owasp.org/index.php/Contact Dave Wichers], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.owasp.org/index.php/Contact Sebastien Deleersnyder], [http://www.owasp.org/index.php/Contact Paulo Coimbra], [http://www.owasp.org/index.php/Contact Kate Hartmann], [http://www.owasp.org/index.php/Contact Alison Shrader] &amp;amp; [http://www.owasp.org/index.php/Category:OWASP_Chapter#Chapter_Support_Materials all local chapter leaders]&lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-rohit-sethi Rohit Sethi] &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni Sahba Kazerooni]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Critical exploits... let us count the ways&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen],''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers[http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital, &amp;lt;br&amp;gt; [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Wild_Wild_Web_on_Security_Planet Wild Wild Web on Security Planet]&lt;br /&gt;
''[http://www.securisksolutions.com/company/execmgt.aspx Mano Paul]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |Shhhh Don’t Tell Anybody &lt;br /&gt;
''[http://www.linkedin.com/in/ppetkov Petko D. Petkov]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af - A Framework to own the web]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar Dr. B. V. Kumar] &amp;amp; [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav Mr. Abhay Bhargav]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP NYC AppSec 2008 VIP Party&lt;br /&gt;
''Location: TBD''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008 &lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Software Development: The Last Security Frontier&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior&lt;br /&gt;
Executive Director and member of the Board of Directors, (ISC)²''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls Best Practices Guide: Web Application Firewalls]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' &amp;amp; ''[http://www.linkedin.com/in/steveantoniewicz Steve Antoniewicz]''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html APPSEC Red/Tiger Team Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lets talk about OWASP....&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Industry Analyst with Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security Research Report&lt;br /&gt;
''[http://www.linkedin.com/pub/5/742/233 Dinis Cruz]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Get Rich or Die Trying - Making Money on The Web, The Black Hat Way&lt;br /&gt;
''Trey Ford, Tom Brennan, Jeremiah Grossman''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [https://www.owasp.org/index.php/User_talk:Jian Lotus Notes/Domino Web Application Security]&lt;br /&gt;
''[https://www.owasp.org/index.php/User_talk:Jian Jian Hui Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The Owasp Orizon Project: towards version 1.0]&lt;br /&gt;
[https://www.owasp.org/index.php/User:Thesp0nge Paolo Perego]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Building_Usable_Security Building Usable Security]&lt;br /&gt;
[http://www.owasp.org/index.php/Zed_Abbadi Zed Abbadi]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Input_validation:_the_Good%2C_the_Bad_and_the_Ugly Input validation: the Good, the Bad and the Ugly]&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-vadim-okun Vadim Okun]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Wizdom of Crowds / CTF Awards &amp;amp; Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th. 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CPE Credits ==&lt;br /&gt;
&lt;br /&gt;
Much of the content is eligible for CPE credits.  Please check with your institution regarding specific requirements.&lt;br /&gt;
&lt;br /&gt;
'''The CISM cpe policy (www.isaca.org/cismcpepolicy) states''': &lt;br /&gt;
&lt;br /&gt;
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.&lt;br /&gt;
&lt;br /&gt;
Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Earn (ISC)2 CPE Credits at 2008 OWASP USA, NYC'''&lt;br /&gt;
&lt;br /&gt;
Attendance at the 2008 OWASP NYC Training Courses or Conferences will earn you Continuing Professional Education (CPE) credits as follows:&lt;br /&gt;
Training Courses: September 22-23, 2008&lt;br /&gt;
•	16 CPE units for 2 days of training (Monday - Tuesday) &lt;br /&gt;
•	8 CPE units for 1 day of training (Monday or Tuesday Only) &lt;br /&gt;
Conferences: September 24-25, 2008&lt;br /&gt;
Earn 1 CPE per hour of conference attendance&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Dave Wichers: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Eric Sheridan: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: John Pavone: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: Arshan Dabirsiaghi: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Conlultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotels in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37619</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37619"/>
				<updated>2008-08-29T17:22:00Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt; Scroll down to see speaker agenda, and training options &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor]  - [http://www.cenzic.com https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - &lt;br /&gt;
[http://www.fishnetsecurity.com https://www.owasp.org/images/4/4a/Fishnet_security.png] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] -[http://www.barracudanetworks.com/ https://www.owasp.org/images/a/a2/Barracuda_Color_Logo.jpg] ~ [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 Members / $400 Non-Members / $200 for Students.  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
OWASP NYC's conference offers tracks for security and development professionals interested in learning how to secure applications and enterprises as well as organization leaders who want to learn more about the state of the appsec industry and its trends.  With two days of training and two days of sessions discussing cutting edge research presented by some of the brightest people in the industry, this event is a must attend for anyone looking to improve their information security posture. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008 &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Doors Open for Attendee/Speaker Registration &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#Technology_Pavilion_-_September_24th_and_25th Exhibit/Sponsor Area]'''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, where we are.. where we are going &lt;br /&gt;
''OWASP Foundation: [http://www.owasp.org/index.php/Contact Jeff Williams], [http://www.owasp.org/index.php/Contact Dinis Cruz], [http://www.owasp.org/index.php/Contact Dave Wichers], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.owasp.org/index.php/Contact Sebastien Deleersnyder], [http://www.owasp.org/index.php/Contact Paulo Coimbra], [http://www.owasp.org/index.php/Contact Kate Hartmann], [http://www.owasp.org/index.php/Contact Alison Shrader] &amp;amp; [http://www.owasp.org/index.php/Category:OWASP_Chapter#Chapter_Support_Materials all local chapter leaders]&lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-rohit-sethi Rohit Sethi] &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni Sahba Kazerooni]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Critical exploits... let us count the ways&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen],''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers[http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital,  [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Wild_Wild_Web_on_Security_Planet Wild Wild Web on Security Planet]&lt;br /&gt;
''[http://www.securisksolutions.com/company/execmgt.aspx Mano Paul]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |Shhhh Don’t Tell Anybody &lt;br /&gt;
''[http://www.linkedin.com/in/ppetkov Petko D. Petkov]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af - A Framework to own the web]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar Dr. B. V. Kumar] &amp;amp; [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav Mr. Abhay Bhargav]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP NYC AppSec 2008 VIP Party&lt;br /&gt;
''Location: TBD''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008 &lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Software Development: The Last Security Frontier&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior&lt;br /&gt;
Executive Director and member of the Board of Directors, (ISC)²''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls Best Practices Guide: Web Application Firewalls]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' &amp;amp; ''[http://www.linkedin.com/in/steveantoniewicz Steve Antoniewicz]''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html APPSEC Red/Tiger Team Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lets talk about OWASP....&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Industry Analyst with Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security Research Report&lt;br /&gt;
''[http://www.linkedin.com/pub/5/742/233 Dinis Cruz]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Get Rich or Die Trying - Making Money on The Web, The Black Hat Way&lt;br /&gt;
''Trey Ford, Tom Brennan, Jeremiah Grossman''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [https://www.owasp.org/index.php/User_talk:Jian Lotus Notes/Domino Web Application Security]&lt;br /&gt;
''[https://www.owasp.org/index.php/User_talk:Jian Jian Hui Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The Owasp Orizon Project: towards version 1.0]&lt;br /&gt;
[https://www.owasp.org/index.php/User:Thesp0nge Paolo Perego]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Building_Usable_Security Building Usable Security]&lt;br /&gt;
[http://www.owasp.org/index.php/Zed_Abbadi Zed Abbadi]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Input_validation:_the_Good%2C_the_Bad_and_the_Ugly Input validation: the Good, the Bad and the Ugly]&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-vadim-okun Vadim Okun]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Wizdom of Crowds / CTF Awards &amp;amp; Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th. 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CPE Credits ==&lt;br /&gt;
&lt;br /&gt;
Much of the content is eligible for CPE credits.  Please check with your institution regarding specific requirements.&lt;br /&gt;
&lt;br /&gt;
'''The CISM cpe policy (www.isaca.org/cismcpepolicy) states''': &lt;br /&gt;
&lt;br /&gt;
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.&lt;br /&gt;
&lt;br /&gt;
Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Earn (ISC)2 CPE Credits at 2008 OWASP USA, NYC'''&lt;br /&gt;
&lt;br /&gt;
Attendance at the 2008 OWASP NYC Training Courses or Conferences will earn you Continuing Professional Education (CPE) credits as follows:&lt;br /&gt;
Training Courses: September 22-23, 2008&lt;br /&gt;
•	16 CPE units for 2 days of training (Monday - Tuesday) &lt;br /&gt;
•	8 CPE units for 1 day of training (Monday or Tuesday Only) &lt;br /&gt;
Conferences: September 24-25, 2008&lt;br /&gt;
Earn 1 CPE per hour of conference attendance&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Dave Wichers: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Eric Sheridan: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: John Pavone: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: Arshan Dabirsiaghi: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Conlultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotels in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37618</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37618"/>
				<updated>2008-08-29T17:15:47Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* 2008 OWASP USA, NYC */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt; Scroll down to see speaker agenda, and training options &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor]  - [http://www.cenzic.com https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - &lt;br /&gt;
[http://www.fishnetsecurity.com https://www.owasp.org/images/4/4a/Fishnet_security.png] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] -[http://www.barracudanetworks.com/ https://www.owasp.org/images/a/a2/Barracuda_Color_Logo.jpg] ~ [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 Members / $400 Non-Members / $200 for Students.  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
OWASP NYC's conference offers tracks for security and development professionals interested in learning how to secure applications and enterprises as well as organization leaders who want to learn more about the state of the appsec industry and its trends.  With two days of training and two days of sessions discussing cutting edge research presented by some of the brightest people in the industry, this event is a must attend for anyone looking to improve their information security posture. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008 &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Doors Open for Attendee/Speaker Registration &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#Technology_Pavilion_-_September_24th_and_25th Exhibit/Sponsor Area]'''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, where we are.. where we are going &lt;br /&gt;
''OWASP Foundation: [http://www.owasp.org/index.php/Contact Jeff Williams], [http://www.owasp.org/index.php/Contact Dinis Cruz], [http://www.owasp.org/index.php/Contact Dave Wichers], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.owasp.org/index.php/Contact Sebastien Deleersnyder], [http://www.owasp.org/index.php/Contact Paulo Coimbra], [http://www.owasp.org/index.php/Contact Kate Hartmann], [http://www.owasp.org/index.php/Contact Alison Shrader] &amp;amp; [http://www.owasp.org/index.php/Category:OWASP_Chapter#Chapter_Support_Materials all local chapter leaders]&lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-rohit-sethi Rohit Sethi] &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni Sahba Kazerooni]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Critical exploits... let us count the ways&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen],''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers,&lt;br /&gt;
Tom King CISO, Barclays Capital,  [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Wild_Wild_Web_on_Security_Planet Wild Wild Web on Security Planet]&lt;br /&gt;
''[http://www.securisksolutions.com/company/execmgt.aspx Mano Paul]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |Shhhh Don’t Tell Anybody &lt;br /&gt;
''[http://www.linkedin.com/in/ppetkov Petko D. Petkov]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af - A Framework to own the web]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar Dr. B. V. Kumar] &amp;amp; [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav Mr. Abhay Bhargav]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP NYC AppSec 2008 VIP Party&lt;br /&gt;
''Location: TBD''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008 &lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Software Development: The Last Security Frontier&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior&lt;br /&gt;
Executive Director and member of the Board of Directors, (ISC)²''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls Best Practices Guide: Web Application Firewalls]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' &amp;amp; ''[http://www.linkedin.com/in/steveantoniewicz Steve Antoniewicz]''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html APPSEC Red/Tiger Team Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lets talk about OWASP....&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Industry Analyst with Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security Research Report&lt;br /&gt;
''[http://www.linkedin.com/pub/5/742/233 Dinis Cruz]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Get Rich or Die Trying - Making Money on The Web, The Black Hat Way&lt;br /&gt;
''Trey Ford, Tom Brennan, Jeremiah Grossman''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [https://www.owasp.org/index.php/User_talk:Jian Lotus Notes/Domino Web Application Security]&lt;br /&gt;
''[https://www.owasp.org/index.php/User_talk:Jian Jian Hui Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The Owasp Orizon Project: towards version 1.0]&lt;br /&gt;
[https://www.owasp.org/index.php/User:Thesp0nge Paolo Perego]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Building_Usable_Security Building Usable Security]&lt;br /&gt;
[http://www.owasp.org/index.php/Zed_Abbadi Zed Abbadi]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Input_validation:_the_Good%2C_the_Bad_and_the_Ugly Input validation: the Good, the Bad and the Ugly]&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-vadim-okun Vadim Okun]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Wizdom of Crowds / CTF Awards &amp;amp; Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th. 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CPE Credits ==&lt;br /&gt;
&lt;br /&gt;
Much of the content is eligible for CPE credits.  Please check with your institution regarding specific requirements.&lt;br /&gt;
&lt;br /&gt;
'''The CISM cpe policy (www.isaca.org/cismcpepolicy) states''': &lt;br /&gt;
&lt;br /&gt;
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.&lt;br /&gt;
&lt;br /&gt;
Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Earn (ISC)2 CPE Credits at 2008 OWASP USA, NYC'''&lt;br /&gt;
&lt;br /&gt;
Attendance at the 2008 OWASP NYC Training Courses or Conferences will earn you Continuing Professional Education (CPE) credits as follows:&lt;br /&gt;
Training Courses: September 22-23, 2008&lt;br /&gt;
•	16 CPE units for 2 days of training (Monday - Tuesday) &lt;br /&gt;
•	8 CPE units for 1 day of training (Monday or Tuesday Only) &lt;br /&gt;
Conferences: September 24-25, 2008&lt;br /&gt;
Earn 1 CPE per hour of conference attendance&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Dave Wichers: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Eric Sheridan: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: John Pavone: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: Arshan Dabirsiaghi: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Conlultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotels in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=34318</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=34318"/>
				<updated>2008-07-18T19:30:06Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] 1/1 - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor] 2/3 - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] - [http://www.cenzic.com/ https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  -  [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.proactiverisk.com https://www.owasp.org/images/9/97/Proactiverisk_logo.jpg] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] ~ [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
In association with: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net ISACA], [http://www.issa.org ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 Members / $400 Non-Members / $200 for Students for [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
To Get more involved and discuss this upcoming event [http://owaspfoundation.ning.com click here for forums] or visit other OWASP [http://www.owasp.org/index.php/Member_Offers member offers]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008 &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Doors Open for Attendee/Speaker Registration &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#Technology_Pavilion_-_September_24th_and_25th Exhibit/Sponsor Area]'''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, where we are.. where we are going &lt;br /&gt;
''[http://www.owasp.org/index.php/Contact OWASP Foundation]: Jeff Williams, Dinis Cruz, Dave Wichers, Tom Brennan, Sebastien Deleersnyder, Paolo Perego, Kate Hartmann &amp;amp; Alison Shrader  &lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''Nishchal Bhalla''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.thinkingstone.com/about/ivan-ristic.html Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | How the City of New York Uses Layer8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Logic Attacks and Inefficiencies of Robotic Detection&lt;br /&gt;
''[http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen], CEO SecTheory''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Reverse Engineering .NET &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs&lt;br /&gt;
[http://www.linkedin.com/in/mahidontamsetti Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Wild_Wild_Web_on_Security_Planet Wild Wild Web on Security Planet]&lt;br /&gt;
''[http://www.expresscertifications.com/company/execmgt.aspx Mano Paul] CEO Express Certifications''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams] &amp;amp; Jim Manico''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |Shhhh Don’t Tell Anybody &lt;br /&gt;
''[http://www.linkedin.com/in/ppetkov Petko D. Petkov]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho W3AF Open Source App Scanner]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''Dr. B. V. Kumar &amp;amp; Mr. Abhay Bhargav''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP NYC AppSec 2008 VIP Party&lt;br /&gt;
''Location: TBD''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008 &lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | State of the Union&lt;br /&gt;
''[http://www.aeispeakers.com/speakerbio.php?SpeakerID=1192 Prof. Howard A. Schmidt, CISSP, CISM (Hon.)] Current (ISC)² Security Strategist and Former White House Cyber Security Advisor''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Best Practices Guide: Web Application Firewalls&lt;br /&gt;
''Dr. Georg Hess''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Good vs. Evil JavaScript&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP V2 Testing Guide 4.2.3 Spidering and Googling in depth &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Update &lt;br /&gt;
''Dinis Cruz/Jeff Williams + Surprise Guest''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Help Wanted 7 Things You Need to Know APPSEC/INFOSEC Employment&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | APPSEC Analyst w/ Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security Research Report&lt;br /&gt;
''[http://www.linkedin.com/pub/5/742/233 Dinis Cruz]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project Pantera Advances]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/598/855 Simon Roses Femerling]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Lotus Notes Insecurity &lt;br /&gt;
''Jian Hui Wang''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Owasp Orizon]&lt;br /&gt;
''Paolo Perego''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Building Usable Security&lt;br /&gt;
''Zed Abbadi''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Input_validation:_the_Good%2C_the_Bad_and_the_Ugly Input validation: the Good, the Bad and the Ugly]&lt;br /&gt;
''Johan Peeters''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | NIST SAMATE Static Analysis Tool Exposition (SATE)&lt;br /&gt;
''Vadim Okun''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Wizdom of Crowds / CTF Awards &amp;amp; Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th. 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Sr. Consultant, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Conlultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotels in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=29597</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=29597"/>
				<updated>2008-05-20T14:59:34Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* OWASP NYC AppSec 2008 Conference Schedule – Sept 24th - Sept 25th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:NYC08_468x60_72_newdates.gif]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP NYC AppSec 2008 - September 22th-25th 2008 =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
In association with: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net ISACA], [http://www.issa.org ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 for 2 days of seminars, $675 for 1-day training classes and $1,350 for 2-day courses. [http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif] - do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/6/60/NY_Sponsorship.pdf Diamond Sponsor] - [http://www.imperva.com https://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/6/60/NY_Sponsorship.pdf Platinum Sponsor] - [http://www.cenzic.com/ https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/6/60/NY_Sponsorship.pdf Gold &amp;amp; Silver Sponsors] -[http://www.accessitgroup.com/products/inspectit.php https://www.owasp.org/images/6/6d/Accessit.JPG] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.ouncelabs.com/ https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg]&lt;br /&gt;
[http://www.proactiverisk.com https://www.owasp.org/images/9/97/Proactiverisk_logo.jpg]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/9/98/NY_Sponsorship_Form.pdf Sponsorship Opportunities] -- [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration]&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP NYC AppSec 2008 Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration Opens and Tech Expo'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:15-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Introduction, OWASP Version 3.0 where we are.. where we are going &lt;br /&gt;
''OWASP Foundation Board Jeff Williams, Tom Brennan, Dinis Cruz, Sebastien Deleersnyder &amp;amp; Dave Wichers''&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Logic Attacks and Inefficiencies of Robotic Detection&lt;br /&gt;
''Robert &amp;quot;RSnake&amp;quot; Hansen CEO [http://www.sectheory.com SecTheory]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Offensive Assessing Financial Apps&lt;br /&gt;
''Daniel Cuthbert''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Web Intrusion Detection with ModSecurity &lt;br /&gt;
''Ivan Ristic''&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Reverse Engineering .NET&lt;br /&gt;
''Adam Boulton''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz] 0.1 - 1.1: [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Building a Java Fuzzer for the Web]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou] - Senior Director - [http://www.ouncelabs.com Ounce Labs] ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP LIVE CD] &lt;br /&gt;
''Joshua Perrymon - CEO [http://www.packetfocus.com Packetfocus]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Multidisciplinary Bank Attacks&lt;br /&gt;
''Gunter Ollmann, Director Security Strategy, [http://www.iss.net IBM Internet Security Systems]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP CLASP&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Shootout at the Blackbox Corral &lt;br /&gt;
''Dinis Cruz &amp;amp; Larry Suto''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:30-14:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Collective Intelligence - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy EVP CitiGroup, Jim Routh CISO DTCC, Sunil Seshadri CISO NYSE-Euronet, Warren Axelrod SVP Bank of America, Joe Bernik Royal Bank of Scotland &amp;amp; Philip Venables CIRO, Goldman, Sachs&lt;br /&gt;
Moderator: Mahi Dontamsetti&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af, a framework to own the web] - &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho ''Andres Riancho''], [http://www.cybsec.com/ Cybsec]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What's_hot_for_2008 | Trends in Web Hacking: What's hot in 2008&amp;lt;br/&amp;gt;Analysis of the Web Hacking Incidents Database (WHID)]]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf], Breach''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''Dave Wichers, COO [http://www.aspectsecurity.com Aspect Security]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/ESAPI OWASP Enterprise Security API (ESAPI) Project]&lt;br /&gt;
''Jeff Williams, CEO [http://www.aspectsecurity.com Aspect Security]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms&lt;br /&gt;
''Arshan Dabirsiaghi, Director of Research [http://www.aspectsecurity.com Aspect Security]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Threading the Needle:&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks.&amp;quot;&lt;br /&gt;
''Arian Evans, Director of Operations [http://www.whitehatsec.com WhiteHat Security]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Shhhh Don’t Tell Anybody&lt;br /&gt;
''Petko D. Petkov, a.k.a. pdp''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Secure PHP&lt;br /&gt;
''Hans Zaunere, CEO [http://www.nyphp.com NYCPHP]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Payment Card Data Security and the new Enterprise Java&lt;br /&gt;
''Dr. B. V. Kumar &amp;amp; Mr. Abhay ''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-18:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Notes Security&lt;br /&gt;
''Jian Hui Wang''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''Taylor McKinley and Jacob West''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | AppSec Techniques&lt;br /&gt;
''JD Glaser, CEO [http://www.ntobjectives.com/company/management.php NTO Objectives]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Capture the Flag - [http://isis.poly.edu/projects Polytechnic University]'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | ''' Speaker/Attendee Reception'''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 8:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Breakfast @ Tech-Expo &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 0900-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;quot;We have all the tools, policies, frameworks, documents, community support available what works... what does not?&amp;quot; '  Industry Panel: &amp;lt;TBD&amp;gt;, &amp;lt;TBD&amp;gt;, &amp;lt;TBD&amp;gt;, &amp;lt;TBD&amp;gt;, &amp;lt;TBD&amp;gt;  Moderator: Daniel Cuthbert''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-11:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; Tom Stracener''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Building Usable Security&lt;br /&gt;
''Zed Abbadi''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Offshoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Orizon Project&lt;br /&gt;
''Paolo Perego''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | NIST SAMATE Static Analysis Tool Exposition (SATE)&lt;br /&gt;
''Vadim Okun''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | AppSec Research&lt;br /&gt;
''Mano Paul''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Software Liability&lt;br /&gt;
''Jack Danahy''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-14:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''1 HR BREAK / TECH EXPO / LUNCH BREAK'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-15:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Projects with OWASP&lt;br /&gt;
''Steve Malson''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Pantera Advances&lt;br /&gt;
''Simon Roses Femerling''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Software-as-a-Service (SaaS)&lt;br /&gt;
''James Landis''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-16:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Out of Band&amp;quot; Injection&lt;br /&gt;
''Vijay Akasapu &amp;amp; Marshall Heilman''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP V2 Testing Guide 4.2.3 Spidering and Googling in depth&lt;br /&gt;
''Christian Heinrich''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Caution, Java ahead&lt;br /&gt;
''Jeremiah Grossman CTO [http://www.whitehatsec.com WhiteHat Security]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-17:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[Input validation: the Good, the Bad and the Ugly]]&lt;br /&gt;
''[[Johan Peeters]]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Learning the .Net Debugging API&lt;br /&gt;
''Kevin Spett''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Secure System Development Life Cycle (SSDLC) Methodology for SOA&lt;br /&gt;
''Ken Huang''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |  Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Friend or Foe: Penetration Testing VS Source Code Analysis&lt;br /&gt;
''Tom Ryan''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Closing Remarks / CTF Awards / Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Farewell dinner.. Go secure the world'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th there will be 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Pravir Chandra, Project Lead OWASP [[:Category:OWASP_CLASP_Project | CLASP]] Project, Principal Consultant, [http://www.cigital.com https://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Application Security Forensics - 1-Day - Sep 23rd - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Web application forensics and incident response, requires a solid understanding of web application, security issues – this 1 day class will provide you with a crashcourse on chain of custody and issues related to dealing with a breach&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T7. Encryption Programming Using SKSML - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Application developers are increasingly required to protect sensitive data through encryption.  While there are many libraries that can assist with cryptography, there are few to none that focus on encryption key management.&lt;br /&gt;
&lt;br /&gt;
This class will introduce you to an OASIS standards protocol - Symmetric Key Services Markup Language (SKSML) - and show you how it can be used to securely encrypt sensitive data and manage encryption keys across the enterprise. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Arshad Noor, CTO, StrongAuth Inc.''' [http://www.strongauth.com https://www.owasp.org/images/8/86/StrongAuth.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotel's in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/9/98/NY_Sponsorship_Form.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=27891</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=27891"/>
				<updated>2008-04-09T00:25:58Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* OWASP NYC AppSec 2008 Conference Schedule – Oct 7th - 8th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference https://www.owasp.org/images/8/88/NYC08_468x60_72.gif] &amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt; Feel free to post this banner to your website(s) to show your support to OWASP NYC 2008 &amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
= OWASP NYC AppSec 2008 - October 7th - 10th 2008 =&lt;br /&gt;
In association with: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net ISACA], [http://www.issa.org ISSA] and [http://www.pace.edu Pace University] your invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 for 2 days of seminars, $675 for 1-day training classes and $1,350 for 2-day courses. [http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Diamond Sponsor - [http://www.imperva.com https://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
Platinum Sponsors - &amp;lt;br&amp;gt;&lt;br /&gt;
Gold &amp;amp; Silver Sponsors -[http://www.accessitgroup.com/products/inspectit.php https://www.owasp.org/images/6/6d/Accessit.JPG] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/6/60/NY_Sponsorship.pdf Sponsorship Opportunities]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP NYC AppSec 2008 Conference Schedule – Oct 7th - 8th ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Oct 7, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration Opens and Tech Expo'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30-10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | '''Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet, Warren Axelrod-SVP Bank of America, Joe Bernik-Royal Bank of Scotland&lt;br /&gt;
Moderator: Mahi Dontamsetti&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Logic Attacks and Inefficiencies of Robotic Detection&lt;br /&gt;
''Robert &amp;quot;RSnake&amp;quot; Hansen''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Offensive Assessing Financial Apps&lt;br /&gt;
''Daniel Cuthbert''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Web Intrusion Detection with ModSecurity &lt;br /&gt;
''Ivan Ristic''&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Reverse Engineering .NET&lt;br /&gt;
''Adam Boulton''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: The History of Building a Java Fuzzer for Web Applications&lt;br /&gt;
''Yiannis Pavlosoglou''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | OWASP LABRAT &lt;br /&gt;
''Joshua Perrymon''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Black Art White Hat&lt;br /&gt;
''Tom Brennan''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP CLASP&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Shootout at the Blackbox Corral &lt;br /&gt;
''Dinis Cruz &amp;amp; Larry Suto''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:30-14:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''1 HR BREAK / TECH EXPO / LUNCH BREAK'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | W3AF Web Application Attack and Audit Framework&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WASC Hacking Incidents&lt;br /&gt;
''Ofer Shezaf''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | OWASP CSRFTester Project &lt;br /&gt;
''Dave Wichers''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API (ESAPI) Project&lt;br /&gt;
''Jeff Williams''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms&lt;br /&gt;
''Arshan Dabirsiaghi''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Application Security Forensics - Now What?&lt;br /&gt;
''FBI Cybercrimes''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Shhhh Don’t Tell Anybody&lt;br /&gt;
''Petko D. Petkov, a.k.a. pdp''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Secure PHP&lt;br /&gt;
''Hans Zaunere''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Payment Card Data Security and the new Enterprise Java&lt;br /&gt;
''Dr. B. V. Kumar &amp;amp; Mr. Abhay ''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-18:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Notes Security&lt;br /&gt;
''Jian Hui Wang''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''Taylor McKinley and Jacob West''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | AppSec Techniques&lt;br /&gt;
''JD Glaser''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Capture the Flag (All Night – Bring it!!)'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Tuesday Night Reception at [http://websterhall.com/2007_websterhall/ NYC Famous Webster Hall]'''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Oct 8, 2008&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Keynote: OWASP Version 3.0 where we are.. where we are going – Jeff Williams, Tom Brennan, Dinis Cruz, Sebastien Deleersnyder, Dave Wichers'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:15-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Industry Panel: ' Moderator''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-11:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Taking the Risk out of Web 2.0&lt;br /&gt;
''Tom Stracener''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Building Usable Security&lt;br /&gt;
''Zed Abbadi''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Offshoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Orizon Project&lt;br /&gt;
''Paolo Perego''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | NIST SAMATE Static Analysis Tool Exposition (SATE)&lt;br /&gt;
''Vadim Okun''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | AppSec Research&lt;br /&gt;
''Mano Paul''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Software Liability&lt;br /&gt;
''Jack Danahy''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-14:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''1 HR BREAK / TECH EXPO / LUNCH BREAK'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-15:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Projects with OWASP&lt;br /&gt;
''Steve Malson''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Pantera Advances&lt;br /&gt;
''Simon Roses Femerling''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Software-as-a-Service (SaaS)&lt;br /&gt;
''James Landis''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-16:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Out of Band&amp;quot; Injection&lt;br /&gt;
''Vijay Akasapu &amp;amp; Marshall Heilman''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP V2 Testing Guide 4.2.3 Spidering and Googling in depth&lt;br /&gt;
''Christian Heinrich''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Caution, Java ahead&lt;br /&gt;
''Jeremiah Grossman''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-17:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Input validation: the Good, the Bad and the Ugly&lt;br /&gt;
''Johan Peeters''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Learning the .Net Debugging API&lt;br /&gt;
''Kevin Spett''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Secure System Development Life Cycle (SSDLC) Methodology for SOA&lt;br /&gt;
''Ken Huang''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |  Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#7B8ABD&amp;quot; align=&amp;quot;left&amp;quot; | Friend or Foe: Penetration Testing VS Source Code Analysis&lt;br /&gt;
''Tom Ryan''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Closing Remarks / CTF Awards / Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Farewell dinner.. Go secure the world'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - October 7th - 8th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On October 7th and 8th there will be 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - October 9th and 10th 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Pravir Chandra, Project Lead OWASP [[:Category:OWASP_CLASP_Project | CLASP]] Project, Principal Consultant, [http://www.cigital.com https://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Oct 9th - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Application Security Forensics - 1-Day - Oct 10th - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Web application forensics and incident response, requires a solid understanding of web application, security issues – this 1 day class will provide you with a crashcourse on chain of custody and issues related to dealing with a breach&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T7. Encryption Programming Using SKSML - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Application developers are increasingly required to protect sensitive data through encryption.  While there are many libraries that can assist with cryptography, there are few to none that focus on encryption key management.&lt;br /&gt;
&lt;br /&gt;
This class will introduce you to an OASIS standards protocol - Symmetric Key Services Markup Language (SKSML) - and show you how it can be used to securely encrypt sensitive data and manage encryption keys across the enterprise. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Arshad Noor, CTO, StrongAuth Inc.''' [http://www.strongauth.com https://www.owasp.org/images/8/86/StrongAuth.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotel's in the area of the event]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/60/NY_Sponsorship.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=26253</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=26253"/>
				<updated>2008-03-04T13:36:51Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
= OWASP NYC AppSec 2008 - October 7th - 10th 2008 =&lt;br /&gt;
&amp;lt;h3&amp;gt;In Association with: [http://www.webappsec.org WASC],  [http://www.nym-infragard.us NYM InfraGard],   [http://aitglobal.com AIT Global], [http://www.isacany.net ISACA], [http://www.issa.org ISSA] and [http://www.pace.edu Pace University]&amp;lt;/h3&amp;gt;&lt;br /&gt;
(2) days of Seminars and Techexpo from the world's best technology minds, (2) days of hardcore hands-on training &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located at downtown, NYC at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP is a 501(3)c [http://www.irs.gov/charities/charitable/article/0,,id=96099,00.html NON-PROFIT] your business can send you and DONATE to this event and get a TAX CREDIT!!  &lt;br /&gt;
&lt;br /&gt;
Fees for this event will be: 2-Day Seminar Fee $350.00, -$50.00 for [http://www.owasp.org/index.php/Membership#Categories_of_Membership OWASP Individual/Corporate Member] - 2-Day Training Fee $1350 / 1-Day Training Classes $675 and this allows us to fund our [http://www.owasp.org/index.php/Funds_available_for_OWASP_Projects Grant Program]. For sponsorship oppertunities [https://www.owasp.org/images/f/f3/OWASP2008-Sponsorship.pdf CLICK HERE] for full details.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;Registration will open on April 1st - no really ;)&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt;[[CFPFAQ | Click here for more info: CFP/SPEAKERS, TRAINERS]]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h1&amp;gt;Tuesday - October 7th&amp;lt;/h1&amp;gt; - *NOTE - Speaker times/dates WILL change once we have a full agenda&lt;br /&gt;
&amp;lt;table border=1 width=800&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt; &amp;lt;th width=50&amp;gt; Time &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Code it! &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Break it!&amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Secure it!&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0800&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Registration Opens &amp;amp; TechExpo     &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0930&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;  Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet (unconfirmed), Warren Axelrod-SVP Bank of America&amp;lt;br&amp;gt;&amp;lt;i&amp;gt; Moderator - Mahi Dontamsetti&amp;lt;/i&amp;gt;&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1030&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Logic Attacks and Inefficiencies of Robotic&lt;br /&gt;
Detection&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Robert &amp;quot;RSnake&amp;quot; Hansen&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Offensive Assessing Financial Apps&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Daniel Cuthbert&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Web Intrusion Detection with ModSecurity&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Ivan Ristic&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1130&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Reverse Engineering .NET&amp;lt;br&amp;gt;&amp;lt;I&amp;gt;Adam Boulton&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;JBroFuzz + Crypto not that hard..&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Yiannis Pavlosoglou &amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Open Reverse Benchmarking &amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Tom Stracener&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1230&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Black Art White Hat&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Tom Brennan&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;OWASP CLASP&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Pravir Chandra&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;.NET Ninja or Pirate? &amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Dinis Cruz&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1330&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;TECH-EXPO LUNCH &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1430&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;W3AF Web Application Attack and Audit Framework.&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Andres Riancho&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;WASC Hacking Incidents&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Jeremiah Grossman&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;OWASP CSRFTester Project&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Dave Wichers&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1530&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;OWASP Enterprise Security API (ESAPI) Project&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Jeff Williams&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Cross Site Scripting - Worms&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Arshan Dabirsiaghi&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Application Security Forensics - Now What&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;FBI Cybercrimes&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1630&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Shhhh don't tell anybody&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Petko D. Petkov, a.k.a pdp&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKER&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1730&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Full Disclosure vs Non-disclosure vs Responsible Disclosure&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Panel&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AppSec Techniques&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;JD Glaser&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1830&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Web Application Capture the Flag (All night - Bring It!)&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;2100&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Tuesday Night Reception @ [http://www.websterhall.com/2007_websterhall NYC Famous Webster Hall]       &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;Wednesday - October 8th&amp;lt;/h1&amp;gt; - Check Back Soon&lt;br /&gt;
&amp;lt;table border=1 width=800&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt; &amp;lt;th width=50&amp;gt; Time &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Code it! &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Break it!&amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Secure it!&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0800&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Web Application Capture the Flag Results&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0930&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt; Keynote: OWASP Foundation Board - &amp;quot;This thing, we have&amp;quot; &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1000&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1100&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;I&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1200&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1300&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;TECH-EXPO LUNCH&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1400&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1500&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1600&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKER&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1700&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Tom Brennan&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1830&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt; TBD &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;2100&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt; Closing Remarks / Awards / Raffles  &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technology Expo - October 7th - 8th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from best of breed technology firms?  For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/f/f3/OWASP2008-Sponsorship.pdf To be a OWASP 501(3)c NON-PROFIT SPONSOR CLICK HERE for details]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP AppSec 2008 Training Courses - October 9th and 10th 2008] ==&lt;br /&gt;
&lt;br /&gt;
TRAINING WITH OWASP IS A DONATION TO A 501(3)c NON-PROFIT&amp;lt;/CENTER&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training Learn More Here]&lt;br /&gt;
&lt;br /&gt;
Lecturer: Pravir Chandra, Project Lead OWASP [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP] Project, Principal Consultant, Cigital&lt;br /&gt;
''' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Advanced Web Application Security Testing - 1-Day - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Syllabus Forthcoming&lt;br /&gt;
&lt;br /&gt;
Lecturer: TBD'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training Learn More Here]&lt;br /&gt;
&lt;br /&gt;
Lecturer: TBD''' &lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Leading the Development of Secure Applications 1-Day - Oct 9th - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training Learn More Here]&lt;br /&gt;
Lecturer: TBD'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Application Security Forensics - 1-Day - Oct 10th - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  How would you respond to a application security hack? This course will provide insight into the world or forensics with a focus on Web Application Security&lt;br /&gt;
&lt;br /&gt;
Lecturer:  TBD'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[[CFPFAQ | Click here for more info: CFP/SPEAKERS]]&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotel's in the area of the event]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=26252</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=26252"/>
				<updated>2008-03-04T13:30:38Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* Technology Expo - October 7th - 8th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
= OWASP NYC AppSec 2008 - October 7th - 10th 2008 =&lt;br /&gt;
&amp;lt;h3&amp;gt;In Association with: [http://www.webappsec.org WASC],  [http://www.nym-infragard.us NYM InfraGard],   [http://aitglobal.com AIT Global], [http://www.isacany.net ISACA], [http://www.issa.org ISSA] and [http://www.pace.edu Pace University]&amp;lt;/h3&amp;gt;&lt;br /&gt;
(2) days of Seminars and Techexpo from the world's best technology minds, (2) days of hardcore hands-on training &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located at downtown, NYC at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP is a 501(3)c [http://www.irs.gov/charities/charitable/article/0,,id=96099,00.html NON-PROFIT] your business can send you and DONATE to this event and get a TAX CREDIT!!  &lt;br /&gt;
&lt;br /&gt;
Fees for this event will be: 2-Day Seminar Fee $350.00, -$50.00 for [http://www.owasp.org/index.php/Membership#Categories_of_Membership OWASP Individual/Corporate Member] - 2-Day Training Fee $1350 / 1-Day Training Classes $675 and this allows us to fund our [http://www.owasp.org/index.php/Funds_available_for_OWASP_Projects Grant Program]. For sponsorship oppertunities [https://www.owasp.org/images/f/f3/OWASP2008-Sponsorship.pdf CLICK HERE] for full details.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;Registration will open on April 1st - no really ;)&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt;[[CFPFAQ | Click here for more info: CFP/SPEAKERS, TRAINERS]]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h1&amp;gt;Tuesday - October 7th&amp;lt;/h1&amp;gt; - *NOTE - Speaker times/dates WILL change once we have a full agenda&lt;br /&gt;
&amp;lt;table border=1 width=800&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt; &amp;lt;th width=50&amp;gt; Time &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Code it! &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Break it!&amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Secure it!&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0800&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Registration Opens &amp;amp; TechExpo     &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0930&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;  Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet (unconfirmed), Warren Axelrod-SVP Bank of America&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1030&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Logic Attacks and Inefficiencies of Robotic&lt;br /&gt;
Detection&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Robert &amp;quot;RSnake&amp;quot; Hansen&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Offensive Assessing Financial Apps&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Daniel Cuthbert&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Web Intrusion Detection with ModSecurity&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Ivan Ristic&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1130&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Reverse Engineering .NET&amp;lt;br&amp;gt;&amp;lt;I&amp;gt;Adam Boulton&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;JBroFuzz + Crypto not that hard..&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Yiannis Pavlosoglou &amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Open Reverse Benchmarking &amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Tom Stracener&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1230&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Black Art White Hat&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Tom Brennan&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;OWASP CLASP&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Pravir Chandra&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;.NET Ninja or Pirate? &amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Dinis Cruz&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1330&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;TECH-EXPO LUNCH &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1430&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;W3AF Web Application Attack and Audit Framework.&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Andres Riancho&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;WASC Hacking Incidents&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Jeremiah Grossman&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;OWASP CSRFTester Project&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Dave Wichers&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1530&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;OWASP Enterprise Security API (ESAPI) Project&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Jeff Williams&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Cross Site Scripting - Worms&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Arshan Dabirsiaghi&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Application Security Forensics - Now What&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;FBI Cybercrimes&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1630&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Shhhh don't tell anybody&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Petko D. Petkov, a.k.a pdp&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKER&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1730&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Full Disclosure vs Non-disclosure vs Responsible Disclosure&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Panel&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AppSec Techniques&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;JD Glaser&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1830&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Web Application Capture the Flag (All night - Bring It!)&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;2100&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Tuesday Night Reception @ [http://www.websterhall.com/2007_websterhall NYC Famous Webster Hall]       &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;Wednesday - October 8th&amp;lt;/h1&amp;gt; - Check Back Soon&lt;br /&gt;
&amp;lt;table border=1 width=800&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt; &amp;lt;th width=50&amp;gt; Time &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Code it! &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Break it!&amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Secure it!&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0800&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Web Application Capture the Flag Results&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0930&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt; Keynote: OWASP Foundation Board - &amp;quot;This thing, we have&amp;quot; &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1000&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1100&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;I&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1200&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1300&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;TECH-EXPO LUNCH&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1400&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1500&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1600&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKER&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1700&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Tom Brennan&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1830&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt; TBD &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;2100&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt; Closing Remarks / Awards / Raffles  &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technology Expo - October 7th - 8th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from best of breed technology firms?  For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/f/f3/OWASP2008-Sponsorship.pdf To be a OWASP 501(3)c NON-PROFIT SPONSOR CLICK HERE for details]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP AppSec 2008 Training Courses - October 9th and 10th 2008] ==&lt;br /&gt;
&lt;br /&gt;
TRAINING WITH OWASP IS A DONATION TO A 501(3)c NON-PROFIT&amp;lt;/CENTER&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training Learn More Here]&lt;br /&gt;
&lt;br /&gt;
Lecturer: Pravir Chandra, Project Lead OWASP [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP] Project, Principal Consultant, Cigital&lt;br /&gt;
''' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Advanced Web Application Security Testing - 1-Day - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Syllabus Forthcoming&lt;br /&gt;
&lt;br /&gt;
Lecturer: TBD'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training Learn More Here]&lt;br /&gt;
&lt;br /&gt;
Lecturer: TBD''' &lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Leading the Development of Secure Applications 1-Day - Oct 9th - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training Learn More Here]&lt;br /&gt;
Lecturer: TBD'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Application Security Forensics - 1-Day - Oct 10th - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  How would you respond to a application security hack? This course will provide insight into the world or forensics with a focus on Web Application Security&lt;br /&gt;
&lt;br /&gt;
Lecturer:  TBD'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[[CFPFAQ | Click here for more info: CFP/SPEAKERS]]&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotel's in the area of the event]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=26251</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=26251"/>
				<updated>2008-03-04T13:29:50Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
= OWASP NYC AppSec 2008 - October 7th - 10th 2008 =&lt;br /&gt;
&amp;lt;h3&amp;gt;In Association with: [http://www.webappsec.org WASC],  [http://www.nym-infragard.us NYM InfraGard],   [http://aitglobal.com AIT Global], [http://www.isacany.net ISACA], [http://www.issa.org ISSA] and [http://www.pace.edu Pace University]&amp;lt;/h3&amp;gt;&lt;br /&gt;
(2) days of Seminars and Techexpo from the world's best technology minds, (2) days of hardcore hands-on training &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located at downtown, NYC at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP is a 501(3)c [http://www.irs.gov/charities/charitable/article/0,,id=96099,00.html NON-PROFIT] your business can send you and DONATE to this event and get a TAX CREDIT!!  &lt;br /&gt;
&lt;br /&gt;
Fees for this event will be: 2-Day Seminar Fee $350.00, -$50.00 for [http://www.owasp.org/index.php/Membership#Categories_of_Membership OWASP Individual/Corporate Member] - 2-Day Training Fee $1350 / 1-Day Training Classes $675 and this allows us to fund our [http://www.owasp.org/index.php/Funds_available_for_OWASP_Projects Grant Program]. For sponsorship oppertunities [https://www.owasp.org/images/f/f3/OWASP2008-Sponsorship.pdf CLICK HERE] for full details.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;Registration will open on April 1st - no really ;)&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt;[[CFPFAQ | Click here for more info: CFP/SPEAKERS, TRAINERS]]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h1&amp;gt;Tuesday - October 7th&amp;lt;/h1&amp;gt; - *NOTE - Speaker times/dates WILL change once we have a full agenda&lt;br /&gt;
&amp;lt;table border=1 width=800&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt; &amp;lt;th width=50&amp;gt; Time &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Code it! &amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Break it!&amp;lt;/th&amp;gt; &amp;lt;th width=250&amp;gt; Secure it!&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0800&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Registration Opens &amp;amp; TechExpo     &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0930&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;  Industry Outlook - Jennifer Bayuk-CISO Bear Stearns, Mark Clancy-EVP Citi, Jim Routh-CISO DTCC, Sunil Seshadri-CISO NYSE-Euronet (unconfirmed), Warren Axelrod-SVP Bank of America&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1030&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Logic Attacks and Inefficiencies of Robotic&lt;br /&gt;
Detection&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Robert &amp;quot;RSnake&amp;quot; Hansen&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Offensive Assessing Financial Apps&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Daniel Cuthbert&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Web Intrusion Detection with ModSecurity&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Ivan Ristic&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1130&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Reverse Engineering .NET&amp;lt;br&amp;gt;&amp;lt;I&amp;gt;Adam Boulton&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;JBroFuzz + Crypto not that hard..&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Yiannis Pavlosoglou &amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Open Reverse Benchmarking &amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Tom Stracener&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1230&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Black Art White Hat&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Tom Brennan&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;OWASP CLASP&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Pravir Chandra&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;.NET Ninja or Pirate? &amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Dinis Cruz&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1330&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;TECH-EXPO LUNCH &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1430&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;W3AF Web Application Attack and Audit Framework.&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Andres Riancho&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;WASC Hacking Incidents&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Jeremiah Grossman&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;OWASP CSRFTester Project&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Dave Wichers&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1530&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;OWASP Enterprise Security API (ESAPI) Project&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Jeff Williams&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Cross Site Scripting - Worms&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Arshan Dabirsiaghi&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Application Security Forensics - Now What&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;FBI Cybercrimes&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1630&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;Shhhh don't tell anybody&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Petko D. Petkov, a.k.a pdp&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKER&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1730&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Full Disclosure vs Non-disclosure vs Responsible Disclosure&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Panel&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AppSec Techniques&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;JD Glaser&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1830&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Web Application Capture the Flag (All night - Bring It!)&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;2100&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Tuesday Night Reception @ [http://www.websterhall.com/2007_websterhall NYC Famous Webster Hall]       &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;Wednesday - October 8th&amp;lt;/h1&amp;gt; - Check Back Soon&lt;br /&gt;
&amp;lt;table border=1 width=950&amp;gt;&lt;br /&gt;
    &amp;lt;tr&amp;gt; &amp;lt;th width=50&amp;gt; Time &amp;lt;/th&amp;gt; &amp;lt;th width=300&amp;gt; Code it! &amp;lt;/th&amp;gt; &amp;lt;th width=300&amp;gt; Break it!&amp;lt;/th&amp;gt; &amp;lt;th width=300&amp;gt; Secure it!&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0800&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;Web Application Capture the Flag Results&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;0930&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt; Keynote: OWASP Foundation Board - &amp;quot;This thing, we have&amp;quot; &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1000&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1100&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;I&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1200&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1300&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt;TECH-EXPO LUNCH&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1400&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1500&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1600&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPICS&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKER&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1700&amp;lt;/th&amp;gt;&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;SPEAKERS&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TOPIC&amp;lt;br&amp;gt;&amp;lt;i&amp;gt;Tom Brennan&amp;lt;/i&amp;gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;1830&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt; TBD &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;2100&amp;lt;/th&amp;gt;&amp;lt;th colspan=3&amp;gt; Closing Remarks / Awards / Raffles  &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technology Expo - October 7th - 8th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from best of breed technology firms?  For 2 days, Product/Service vendors worldwide will demonstrate their ability to conference attendees.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/f/f3/OWASP2008-Sponsorship.pdf To be a OWASP 501(3)c NON-PROFIT SPONSOR CLICK HERE for details]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP AppSec 2008 Training Courses - October 9th and 10th 2008] ==&lt;br /&gt;
&lt;br /&gt;
TRAINING WITH OWASP IS A DONATION TO A 501(3)c NON-PROFIT&amp;lt;/CENTER&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training Learn More Here]&lt;br /&gt;
&lt;br /&gt;
Lecturer: Pravir Chandra, Project Lead OWASP [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP] Project, Principal Consultant, Cigital&lt;br /&gt;
''' &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Advanced Web Application Security Testing - 1-Day - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Syllabus Forthcoming&lt;br /&gt;
&lt;br /&gt;
Lecturer: TBD'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training Learn More Here]&lt;br /&gt;
&lt;br /&gt;
Lecturer: TBD''' &lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Leading the Development of Secure Applications 1-Day - Oct 9th - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training Learn More Here]&lt;br /&gt;
Lecturer: TBD'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Application Security Forensics - 1-Day - Oct 10th - $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  How would you respond to a application security hack? This course will provide insight into the world or forensics with a focus on Web Application Security&lt;br /&gt;
&lt;br /&gt;
Lecturer:  TBD'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[[CFPFAQ | Click here for more info: CFP/SPEAKERS]]&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotel's in the area of the event]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=22305</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=22305"/>
				<updated>2007-10-10T13:28:29Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* OCTOBER 25th 2007 MEETING */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}}  &lt;br /&gt;
&lt;br /&gt;
==OCTOBER 25th 2007 MEETING==&lt;br /&gt;
Full Day, information security summit happening in New Jersey on October 25th. At this all day event, learn from industry experts on topics of information security.  There is no charge for this event however &amp;lt;b&amp;gt; YOU MUST RSVP &amp;lt;/b&amp;gt; if you are not on the RSVP list or have Photo ID, Verizon Security will NOT PERMIT YOU IN THE BUILDING.&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS]===&lt;br /&gt;
COSPONSORS: &amp;lt;b&amp;gt;[http://www.mcafee.com McAfee]  ---  [http://intrepidusgroup.com Intrepidus Group] --- [http://www.accessitgroup.com/services/security.php AccessIT Group] --- [http://www.symantec.com Symantec] --- [http://www.mandiant.com Mandiant] --- [http://www.whitehatsec.com WhiteHat] --- [http://www.cenzic.com Cenzic] --- [http://www.net2s-us.com Net2S] --- [http://www.fortifysoftware.com Fortify] &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 295 N Maple Ave, Basking Ridge, NJ 07920 ~ [http://tinyurl.com/2vuh7f Directions]&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;October 25th 8:30am-5:00pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
8:30am - 9:00am - Security Check-In / Breakfast / TechExpo / Peer-to-Peer Networking ;)&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
9:00am - 09:30am - What is OWASP? Speakers: &amp;lt;b&amp;gt;Board Members OWASP NYC Metro&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
09:30am - 10:00am - Keynote Speaker: &amp;lt;b&amp;gt;Phil Varughese, Verizon Wireless &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Philip, Manager of Network Security Risk Management with Verizon Wireless has a leadership role in shaping particular facets of the Network Department Information Security program. Co developed and implemented an operational and effective Risk Management Program and integrated security engineering into the development lifecycle for projects and products. He is responsible for the strategic direction of risk management, vulnerability management and all tactical security issues.&lt;br /&gt;
&lt;br /&gt;
Philip is a subject matter expert in Information Security and technical risk management. During his career, he has worked with several Fortune 500 firms. He has worked in the telecommunication, transportation, pharmaceutical, financial and consulting sector.  He also holds many industry certifications like, CISSP, CISM, CISA, GSEC and SCCP&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
10:30am - 11:30am - TOPIC: &amp;lt;b&amp;gt;Ready...Set...Click &amp;lt;/b&amp;gt; We can no longer think about consumer interaction and security as two different topics on opposite ends of the spectrum. They're two very important and very inter-related topics that affect everyone. The speech will describe real world flaws, poorly designed security and what hackers are doing to exploit today's websites. Lastly, it will show some forward thinking mitigation tactics.&lt;br /&gt;
&lt;br /&gt;
SPEAKER: &amp;lt;b&amp;gt;Robert &amp;quot;RSnake&amp;quot; Hansen&amp;lt;/b&amp;gt; &lt;br /&gt;
Robert has worked in the security industry since the mid 1990s and helped pioneer leading banner advertising and click fraud detection solutions. During his tenure at eBay, Mr. Hansen worked on anti-cross site scripting, anti-phishing, anti-virus and web application intrusion detection and countermeasures and was directly responsible for the company's entire authentication architecture. For many years he ran the managed security services product lines for Cable &amp;amp; Wireless. He has spoken at Blackhat, Microsoft's Bluehat, the Rotary, OWASP, the Gartner security round table and at Networld+Interop.  He is a member of WASC, OWASP, ISC2, APWG and ISSA.&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
11:45 - 12:15pm - TOPIC: &amp;lt;b&amp;gt;Dig Your Own Hole: 12 Ways to Go Wrong with Java Security&amp;lt;/b&amp;gt; This session explores 12 of the most common security traps in Java. This session doesn’t include a review of 10–year–old guidelines for writing secure applets with JDK 1.1. Instead, it looks at causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, it looks at vulnerabilities from a developer’s perspective, focusing on the source code. &lt;br /&gt;
&lt;br /&gt;
SPEAKER:  &amp;lt;b&amp;gt;Eric Cabetas&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
12:15pm - 1:00pm  LUNCH / Peer-to-Peer Networking / RAFFLES&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
1:00pm - 1:30pm TOPIC: &amp;lt;b&amp;gt;Network Based Infection Detection&amp;lt;/b&amp;gt; No system is 100% secure and security often fails. As a result roughly 10% of hosts within an enterprise get infected every year. Infections are caused by vulnerabilities in applications, policy violations by insiders&lt;br /&gt;
and misconfigured services. Worms and viruses are not the only form of infections. Botnets, Proxies, Trojans, Keyloggers, Adware, Rootkits can be far more damaging. Even applications like Google Desktop, Skype and Foldershare can leak business secrets and hence be viewed as infections.&lt;br /&gt;
Infected hosts within a network pose a serious risk to business assets. Detecting infections and cleaning up after them costs an organization a big part of its IT budget as detection, containment and eradication procedures are mostly manual and labor intensive.&lt;br /&gt;
&lt;br /&gt;
In this talk we describe a network based infection detection system developed at Polytechnic University. The system collects and synopsizes network traffic with strategically placed infection sensors in the network. It then analyzes network traffic for symptoms of infections to identify infected hosts. Once an infection is found and characterized, it retroactively detects similar infections which could have occurred weeks and months in the past but have not been detected yet. Finally, it provides solutions for cleanup including containment and eradication in a simple, efficient and economical manner.&lt;br /&gt;
&lt;br /&gt;
SPEAKER: &amp;lt;b&amp;gt;Professor Nasir Memon &amp;lt;/b&amp;gt; Department of Computer and Information Science of Polytechnic Univ. His research interests include Data Compression, Computer and Network Security, Multimedia&lt;br /&gt;
Communication and Digital Forensics. He has published more than 200 articles in journals and conference proceedings on these topics. He was an associate editor for IEEE Transactions on Image&lt;br /&gt;
Processing, the Journal of Electronic Imaging, and the ACM Multimedia Systems Journal. He is currently an associate editor for the IEEE Transactions on Information Security and Forensics,&lt;br /&gt;
the LNCS Transaction on Data Hiding, IEEE Security and Privacy Magazine, IEEE Signal Processing Magazine and the International Journal on Network Security.&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
1:45pm - 2:15pm TOPIC: &amp;lt;b&amp;gt;Mobile Phone Security: Past, Present, and Future&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER: &amp;lt;b&amp;gt;Corey Benninger&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
2:30pm - 3:00  TOPIC: &amp;lt;b&amp;gt;VOIP - Can you hear me now?&amp;lt;/b&amp;gt; The presentation will disclose new attacks and weaknesses associated with protocols that are used to establish and protect VoIP communications. In addition, a newer &amp;quot;unpublished&amp;quot; version of the SIVuS tool will be demoed.&lt;br /&gt;
&lt;br /&gt;
SPEAKER: &amp;lt;b&amp;gt;Peter Thermos &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Peter Thermos has over a decade of experience in consulting and research in several areas of Information Security and Assurance and has held senior technical and management positions with telecommunications companies in research and consulting.&lt;br /&gt;
&lt;br /&gt;
Peter has been the lead technical expert on various tasks (for commercial and government organizations) associated with information security and assurance including security risk assessments, standards and requirements development, ISO 17799 assessments, network security architecture and organizational security strategy. He is the author of SIVuS (The 1st VoIP vulnerability Scanner) and has published articles and refereed research papers on VoIP Security. Peter holds a Masters degree in Computer Science from Columbia University, NY and he is an active member of IETF/IEEE/ACM.&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
3:15 - 3:45pm  TOPIC: &amp;lt;b&amp;gt;Cutting Edge Application Analysis&amp;lt;/b&amp;gt; This presentation will focus on black box and white box methods of testing web applications. We will do a deep dive into source code analysis techniques that could be used in different testing scenarios to identify security weak points. &lt;br /&gt;
&lt;br /&gt;
SPEAKER: &amp;lt;b&amp;gt; Frank Gardner &amp;lt;/b&amp;gt; extensive experience in UNIX kernel development, exploit code design, protocol analysis, web application security, and cryptography&lt;br /&gt;
&lt;br /&gt;
Previous projects have included the development of B1 Trusted Operating Systems extensions for Linux 2.2 and 2.4 kernels, Protected Mode OS (IA32) development, ARP promiscuous node detection, and Protocol Fuzzing tools&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
4:00 - 4:30pm TOPIC: &amp;lt;b&amp;gt;Web Application Threats&amp;lt;/b&amp;gt; This talk will demostrate application security falws (hehe) commonly found in web applications and the reasons for them. SQL Injection, Cross Site Scripting and more as outlined in the [http://www.owasp.org/index.php/Top_10_2007 OWASP-Top 10]&lt;br /&gt;
&lt;br /&gt;
SPEAKER: &amp;lt;b&amp;gt;Dennis Hurst&amp;lt;/b&amp;gt;  &lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
4:45 - 5:15pm TOPIC: &amp;lt;b&amp;gt;BS7799/ISO17799/ISO27001 What is it?... Why do you care?... Why is it failing?&amp;lt;/b&amp;gt; Brief overview of ISO27001 will be provided, along with a presentation on its key features and purpose. Real world examples of how ISO27001 audits are conducted and approaches used by auditors will be discussed. Finally the real impact of ISO27001 and how it can be improved will be presented&lt;br /&gt;
&lt;br /&gt;
SPEAKER: &amp;lt;b&amp;gt;Mahi Dontamsetti&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mahi has extensive experience in security, software development, risk management and telecommunications. He has worked on projects involving the Pentagon and Dept. of Homeland Security. A former Chief Technologist at Lockheed, he has authored couple of books on telecommunications. He was part of a team that developed the world's first combined cellular switch and radio controller. &lt;br /&gt;
Most recently he has been involved in making information security more measurable and has brought a metrics based Information Security Management System (ISMS) standard to the market.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;CENTER&amp;gt; [http://fs7.formsite.com/OWASP/form185709121/index.html RSVP NOW] &amp;lt;/CENTER&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for upcoming meeting please provide submit your powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include a speaker BIO. If you wish to become a sponsor or co-sponsor please click on one of the below email addresses of our active board members.&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:jinxpuppy(at)gmail.com Tom Brennan] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:pperfetti(at)nba.com Pete Perfetti] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz] &lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti]&lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:tom.ryan(at)providesecurity.com Tom Ryan]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pstern100(at)gmail.com Peter Stern] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:dougshin(at)gmail.com Douglas Shin]&lt;br /&gt;
Educational Advisors&lt;br /&gt;
*&amp;lt;b&amp;gt;New Jersey Institute of Technology:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Polytechnic University:&amp;lt;/b&amp;gt; [mailto:memon(at)poly.edu Nasir Memon]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006 &amp;lt;br&amp;gt;&lt;br /&gt;
973-202-0122&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[https://fs7.formsite.com/OWASP/form945832292/secure_index.html ONLINE PAYMENT OWASP NYC]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.proactiverisk.com ~]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21469</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21469"/>
				<updated>2007-09-05T18:24:07Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}}  &lt;br /&gt;
&lt;br /&gt;
==SEPTEMBER 6th MEETING==&lt;br /&gt;
OWASP supports Global Security Week (Sept. 3rd-9th) [http://www.globalsecurityweek.com/index.html Click Here More Info...]. In local support of this worldwide effort, the next NY/NJ OWASP Chapter meeting will be on &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;September 6th 5:30pm-9:00pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://www.amex.com AMERICAN STOCK EXCHANGE]===&lt;br /&gt;
Special thanks to OWASP Board Member: Doug Shin of the AMEX&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 86 Trinity Place, NY NY 10006 ~ [http://tinyurl.com/2c5ohu Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://signacert.com SIGNACERT] ~~ [http://www.ouncelabs.com OUNCE LABS] ~~ [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.fortifysoftware.com FORTIFY SOFTWARE] ~~ [http://www.cenzic.com CENZIC]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Global Security Week Working Group&amp;lt;/b&amp;gt; - [http://www.globalsecurityweek.com/html/global_initiatives.html GSW]&lt;br /&gt;
What is the current state of Privacy on Web Application Security? &lt;br /&gt;
What should we be focusing on?&lt;br /&gt;
&lt;br /&gt;
Panel Leader: Tom Brennan [http://www.owasp.org OWASP NY/NJ Metro President]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Why today's vulnerability assessments are failing and a case for industry standardization&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
As organizations mature their information security capabilities they start to extend their requirements to their partners and providers.  Providing for the identification and management of information security issues are becoming part of contractual language. Vulnerability Assessment / ethical reports today are used today as one measurable data point to build a confidence in the status of other parties’ web applications and is generally an accepted set in due diligence.  The challenge today is these Vulnerability Assessments are inconsistent in scope &amp;amp; rigor, and reported in a form that makes them incomparable between institutions.   It is frequently impossible to understand what test design was used (black box/white box), what set of conditions were tested (OWASP top ten only, CVE, items found by common scanning tools, manually exercised conditions, etc) and how issues were rated for severity (CVSS, vendor provided, customer provided, etc).  A similar problem existed with information security assessments of operational and physical security at outsourced service providers used by financial institutions and was address by developing an “agreed upon procedures” approach to outline common things needed by institutions so that assessments could be done once by a neutral party and then reused. This presentation, while not offering the complete answer for application security testing, will attempt to outline the components needed for such a solution. &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mark Clancy is Senior Vice President at [http://www.citigroup.com Citigroup]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Hackers...BotNets oh My!&amp;lt;/b&amp;gt;&lt;br /&gt;
FBI Cybercrimes task force to discuss global status of BotNets.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Chris Stangel [http://newyork.fbi.gov/nyfohome.htm NYC FBI Cyber Crime Unit] &lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;OWASP Project JBroFuzz: Fuzzing for Network and Web Applications &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a OWASP stateless network protocol fuzzer that emerged from the&lt;br /&gt;
needs of penetration testing. This presentation will aim to illustrate&lt;br /&gt;
efficient ways of fuzzing in order to minimize the amount of time spent in&lt;br /&gt;
discovering application and network protocol vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Dr. Yiannis Pavlosoglou is a Security Project Manager at&lt;br /&gt;
[http://www.irmplc.com Information Risk Management]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Stock fluctuation from an unrecognized influence. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Justine Bone - Aitel - [http://www.immunityinc.com Immunity Security]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt;[http://fs7.formsite.com/OWASP/form185804020/index.html RSVP IS REQUESTED] &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OCTOBER 25th MEETING==&lt;br /&gt;
Full Day, information security summit happening in New Jersey on October 25th. At this all day event, learn from industry experts on topics of information security.  There is no charge for this event. &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;October 25th 9:30am-4:30pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS]===&lt;br /&gt;
Special thanks to: Philip Varughese&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 295 N Maple Ave, Basking Ridge, NJ 07920 ~ [http://tinyurl.com/2vuh7f Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.cenzic.com CENZIC]&lt;br /&gt;
~~ [http://www.archer-tech.com ARCHER TECHNOLOGIES]  ~~ [http://www.intrepidusgroup.com INTREPIDUS GROUP] ~~ [http://www.mandiant.com MANDIANT]&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Keynote&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Renato Delatorre, Verizon Wireless&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Social Engineering&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Kevin Mitnick&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;ISO 27001 What is it... Why do you care?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mahi Dontamsetti&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;VOIP - Can you hear me now?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Paul Rohmeyer, Michael McCobb&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Internet Fraud - War Stories&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mike Esposito&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Dig Your Own Hole: 12 Ways to Go Wrong with Java Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  Richard Bowen&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Mobile Security &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Philip Varughese, Corey Benninger &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt; &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for upcoming meeting please provide submit your powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include a speaker BIO. If you wish to become a sponsor or co-sponsor please click on one of the below email addresses of our active board members.&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:jinxpuppy(at)gmail.com Tom Brennan] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:pperfetti(at)nba.com Pete Perfetti] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz] &lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:tom.ryan(at)providesecurity.com Tom Ryan] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pstern100(at)gmail.com Peter Stern] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:dougshin(at)gmail.com Douglas Shin]&lt;br /&gt;
Educational Advisors&lt;br /&gt;
*&amp;lt;b&amp;gt;New Jersey Institute of Technology:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Polytechnic University:&amp;lt;/b&amp;gt; [mailto:memon(at)poly.edu Nasir Memon]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006 &amp;lt;br&amp;gt;&lt;br /&gt;
973-202-0122&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.proactiverisk.com ~]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21301</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21301"/>
				<updated>2007-08-31T12:40:59Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}}  &lt;br /&gt;
&lt;br /&gt;
==SEPTEMBER 6th MEETING==&lt;br /&gt;
OWASP supports Global Security Week (Sept. 3rd-9th) [http://www.globalsecurityweek.com/index.html Click Here More Info...]. In local support of this worldwide effort, the next NY/NJ OWASP Chapter meeting will be on &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;September 6th 5:30pm-9:00pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://www.amex.com AMERICAN STOCK EXCHANGE]===&lt;br /&gt;
Special thanks to: Doug Shin&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 86 Trinity Place, NY NY 10006 ~ [http://tinyurl.com/2c5ohu Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://signacert.com SIGNACERT] ~~ [http://www.ouncelabs.com OUNCE LABS] ~~ [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.fortifysoftware.com FORTIFY SOFTWARE]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Financial Real-Time Threats: Impacting Trading Floor Operations &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will aim to illustrate how individual application or&lt;br /&gt;
network layer threats, if combined correctly, can impact the workload&lt;br /&gt;
between the “pit” and departments such as settlements, processing and&lt;br /&gt;
accounting. Stemming from the lowest level of internal threat, systems on,&lt;br /&gt;
or behind, trading floor operations can be manipulated in ways that might&lt;br /&gt;
even go unnoticed. Such impact is possible due to the shear complexity of&lt;br /&gt;
the enterprise applications used, as well as the ways in which they are&lt;br /&gt;
inter-related.&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;JBroFuzz: Effective Fuzzing for Network and Web Applications &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the&lt;br /&gt;
needs of penetration testing. This presentation will aim to illustrate&lt;br /&gt;
efficient ways of fuzzing in order to minimize the amount of time spent in&lt;br /&gt;
discovering application and network protocol vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Dr. Yiannis Pavlosoglou is a Security Project Manager at&lt;br /&gt;
[http://www.irmplc.com Information Risk Management]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Stock fluctuation from an unrecognized influence. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Justine Bone-Aitel - [http://www.immunityinc.com Immunity Security]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Hackers...BotNets oh My!&amp;lt;/b&amp;gt;  Obtain a briefing on the current BotNet investigations etc.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: [http://newyork.fbi.gov/nyfohome.htm NYC FBI Cyber Crime Unit]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Why today's vulnerability assessments are failing and a case for industry standardization&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
As organizations mature their information security capabilities they start to extend their requirements to their partners and providers.  Providing for the identification and management of information security issues are becoming part of contractual language. Vulnerability Assessment / ethical reports today are used today as one measurable data point to build a confidence in the status of other parties’ web applications and is generally an accepted set in due diligence.  The challenge today is these Vulnerability Assessments are inconsistent in scope &amp;amp; rigor, and reported in a form that makes them incomparable between institutions.   It is frequently impossible to understand what test design was used (black box/white box), what set of conditions were tested (OWASP top ten only, CVE, items found by common scanning tools, manually exercised conditions, etc) and how issues were rated for severity (CVSS, vendor provided, customer provided, etc).  A similar problem existed with information security assessments of operational and physical security at outsourced service providers used by financial institutions and was address by developing an “agreed upon procedures” approach to outline common things needed by institutions so that assessments could be done once by a neutral party and then reused. This presentation, while not offering the complete answer for application security testing, will attempt to outline the components needed for such a solution. &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mark Clancy is Senior Vice President at [http://www.citigroup.com Citigroup]&lt;br /&gt;
Mr. Clancy has 15 years experience in the information systems and information security industry.  His responsibilities include management of technical content of the company’s information security polices and standards.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Citigroup Mr. Clancy was a consultant working with many fortune 500 companies on Information systems and Information security projects spanning the banking, insurance, pharmaceutical and manufacturing industry sectors. He holds a BS in Electrical Engineering from Drexel University and is a member of IEEE and ISSA and a participant in the FS-ISAC, BITS, FSTC, Financial Fortress Leadership Group, and Global Security Consortium.&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &lt;br /&gt;
&amp;lt;b&amp;gt;Blackhat/Defcon&amp;lt;/b&amp;gt; - during this debriefing we will discuss many of the hot bleeding edge INFOSEC topics that were covered at the [http://www.blackhat.com Blackhat] &amp;amp; [http://www.defcon.org Defcon] event Aug 1st - Aug 5th.  If you attended the event, look for your picture win a prize... if you missed this annual event, you will want to attend to get a briefing on the hot topics!!!&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &lt;br /&gt;
Tom Brennan, President OWASP NY/NJ Metro&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Global Security Week&amp;lt;/b&amp;gt;&lt;br /&gt;
What is the current state of Privacy on Web Application Security? &lt;br /&gt;
What should we be focusing on?&lt;br /&gt;
&lt;br /&gt;
Round-Table Panel - [http://www.globalsecurityweek.com/html/calendar.html GSW]&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt;[http://fs7.formsite.com/OWASP/form185804020/index.html RSVP IS REQUESTED] &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OCTOBER 25th MEETING==&lt;br /&gt;
Full Day, information security summit happening in New Jersey on October 25th. At this all day event, learn from industry experts on topics of information security.  There is no charge for this event. &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;October 25th 9:30am-4:30pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS]===&lt;br /&gt;
Special thanks to: Philip Varughese&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 295 N Maple Ave, Basking Ridge, NJ 07920 ~ [http://tinyurl.com/2vuh7f Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.cenzic.com CENZIC]&lt;br /&gt;
~~ [http://www.archer-tech.com ARCHER TECHNOLOGIES]  ~~ [http://www.intrepidusgroup.com INTREPIDUS GROUP]  ~~ [http://www.mandiant.com MANDIANT]&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Keynote&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Renato Delatorre, Verizon Wireless&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Social Engineering&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Kevin Mitnick&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;ISO 27001 What is it... Why do you care?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mahi Dontamsetti&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;VOIP - Can you hear me now?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Paul Rohmeyer&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Internet Fraud - War Stories&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mike Esposito&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Dig Your Own Hole: 12 Ways to Go Wrong with Java Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  Richard Bowen&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: IMS = Is Missing Security? &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Peter Thermos, Michael McCobb&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: TBD&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt; &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for upcoming meeting please provide submit your powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include a speaker BIO. If you wish to become a sponsor or co-sponsor please click on one of the below email addresses of our active board members.&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:jinxpuppy(at)gmail.com Tom Brennan] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:peter.perfetti(at)abnamro.com Pete Perfetti] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz] &lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:tom.ryan(at)providesecurity.com Tom Ryan] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pstern100(at)gmail.com Peter Stern] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:dougshin(at)gmail.com Douglas Shin]&lt;br /&gt;
Educational Advisors&lt;br /&gt;
*&amp;lt;b&amp;gt;New Jersey Institute of Technology:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Polytechnic University:&amp;lt;/b&amp;gt; [mailto:memon(at)poly.edu Nasir Memon]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006 &amp;lt;br&amp;gt;&lt;br /&gt;
973-202-0122&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.proactiverisk.com ~]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21261</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21261"/>
				<updated>2007-08-30T17:25:13Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* PRIMARY SPONSOR: [http://www.amex.com AMERICAN STOCK EXCHANGE] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}}  &lt;br /&gt;
&lt;br /&gt;
==SEPTEMBER 6th MEETING==&lt;br /&gt;
OWASP supports Global Security Week (Sept. 3rd-9th) [http://www.globalsecurityweek.com/index.html Click Here More Info...]. In local support of this worldwide effort, the next NY/NJ OWASP Chapter meeting will be on &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;September 6th 5:30pm-9:00pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://www.amex.com AMERICAN STOCK EXCHANGE]===&lt;br /&gt;
Special thanks to: Doug Shin&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 86 Trinity Place, NY NY 10006 ~ [http://tinyurl.com/2c5ohu Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://signacert.com SIGNACERT] ~~ [http://www.ouncelabs.com OUNCE LABS] ~~ [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.fortifysoftware.com FORTIFY SOFTWARE]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Financial Real-Time Threats: Impacting Trading Floor Operations &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will aim to illustrate how individual application or&lt;br /&gt;
network layer threats, if combined correctly, can impact the workload&lt;br /&gt;
between the “pit” and departments such as settlements, processing and&lt;br /&gt;
accounting. Stemming from the lowest level of internal threat, systems on,&lt;br /&gt;
or behind, trading floor operations can be manipulated in ways that might&lt;br /&gt;
even go unnoticed. Such impact is possible due to the shear complexity of&lt;br /&gt;
the enterprise applications used, as well as the ways in which they are&lt;br /&gt;
inter-related.&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;JBroFuzz: Effective Fuzzing for Network and Web Applications &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the&lt;br /&gt;
needs of penetration testing. This presentation will aim to illustrate&lt;br /&gt;
efficient ways of fuzzing in order to minimize the amount of time spent in&lt;br /&gt;
discovering application and network protocol vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Dr. Yiannis Pavlosoglou is a Security Project Manager at&lt;br /&gt;
[http://www.irmplc.com Information Risk Management]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Stock fluctuation from an unrecognized influence. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Justine Bone-Aitel - [http://www.immunityinc.com Immunity Security]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Hackers...BotNets oh My!&amp;lt;/b&amp;gt;  Obtain a briefing on the current BotNet investigations etc.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: [http://newyork.fbi.gov/nyfohome.htm NYC FBI Cyber Crime Unit]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Why today's vulnerability assessments are failing and a case for industry standardization&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
As organizations mature their information security capabilities they start to extend their requirements to their partners and providers.  Providing for the identification and management of information security issues are becoming part of contractual language. Vulnerability Assessment / ethical reports today are used today as one measurable data point to build a confidence in the status of other parties’ web applications and is generally an accepted set in due diligence.  The challenge today is these Vulnerability Assessments are inconsistent in scope &amp;amp; rigor, and reported in a form that makes them incomparable between institutions.   It is frequently impossible to understand what test design was used (black box/white box), what set of conditions were tested (OWASP top ten only, CVE, items found by common scanning tools, manually exercised conditions, etc) and how issues were rated for severity (CVSS, vendor provided, customer provided, etc).  A similar problem existed with information security assessments of operational and physical security at outsourced service providers used by financial institutions and was address by developing an “agreed upon procedures” approach to outline common things needed by institutions so that assessments could be done once by a neutral party and then reused. This presentation, while not offering the complete answer for application security testing, will attempt to outline the components needed for such a solution. &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mark Clancy is Senior Vice President at [http://www.citigroup.com Citigroup]&lt;br /&gt;
Mr. Clancy has 15 years experience in the information systems and information security industry.  His responsibilities include management of technical content of the company’s information security polices and standards.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Citigroup Mr. Clancy was a consultant working with many fortune 500 companies on Information systems and Information security projects spanning the banking, insurance, pharmaceutical and manufacturing industry sectors. He holds a BS in Electrical Engineering from Drexel University and is a member of IEEE and ISSA and a participant in the FS-ISAC, BITS, FSTC, Financial Fortress Leadership Group, and Global Security Consortium.&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &lt;br /&gt;
&amp;lt;b&amp;gt;Blackhat/Defcon&amp;lt;/b&amp;gt; - during this debriefing we will discuss many of the hot bleeding edge INFOSEC topics that were covered at the [http://www.blackhat.com Blackhat] &amp;amp; [http://www.defcon.org Defcon] event Aug 1st - Aug 5th.  If you attended the event, look for your picture win a prize... if you missed this annual event, you will want to attend to get a briefing on the hot topics!!!&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &lt;br /&gt;
Tom Brennan, President OWASP NY/NJ Metro&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Global Security Week&amp;lt;/b&amp;gt;&lt;br /&gt;
What is the current state of Privacy on Web Application Security? &lt;br /&gt;
What should we be focusing on?&lt;br /&gt;
&lt;br /&gt;
Round-Table Panel - [http://www.globalsecurityweek.com/html/calendar.html GSW]&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt;[http://fs7.formsite.com/OWASP/form185804020/index.html RSVP IS REQUESTED] &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OCTOBER 25th MEETING==&lt;br /&gt;
Full Day, information security summit happening in New Jersey on October 25th. At this all day event, learn from industry experts on topics of information security.  There is no charge for this event. &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;October 25th 9:30am-4:30pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS]===&lt;br /&gt;
Special thanks to: Philip Varughese&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 295 N Maple Ave, Basking Ridge, NJ 07920 ~ [http://tinyurl.com/2vuh7f Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.cenzic.com CENZIC]&lt;br /&gt;
~~ [http://www.archer-tech.com ARCHER TECHNOLOGIES]  ~~ [http://www.intrepidusgroup.com INTREPIDUS GROUP]  ~~ [http://www.mandiant.com MANDIANT]&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Keynote&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Renato Delatorre, Verizon Wireless&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Social Engineering&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Kevin Mitnick&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;ISO 27001 What is it... Why do you care?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mahi Dontamsetti&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;VOIP - Can you hear me now?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Paul Rohmeyer&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Internet Fraud - War Stories&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mike Esposito&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Dig Your Own Hole: 12 Ways to Go Wrong with Java Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  Richard Bowen&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: TBD&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: TBD&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt; &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for upcoming meeting please provide submit your powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include a speaker BIO. If you wish to become a sponsor or co-sponsor please click on one of the below email addresses of our active board members.&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:jinxpuppy(at)gmail.com Tom Brennan] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:peter.perfetti(at)abnamro.com Pete Perfetti] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz] &lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:tom.ryan(at)providesecurity.com Tom Ryan] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pstern100(at)gmail.com Peter Stern] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:dougshin(at)gmail.com Douglas Shin]&lt;br /&gt;
Educational Advisors&lt;br /&gt;
*&amp;lt;b&amp;gt;New Jersey Institute of Technology:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Polytechnic University:&amp;lt;/b&amp;gt; [mailto:memon(at)poly.edu Nasir Memon]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006 &amp;lt;br&amp;gt;&lt;br /&gt;
973-202-0122&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.proactiverisk.com ~]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21191</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21191"/>
				<updated>2007-08-28T16:45:38Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}}  &lt;br /&gt;
&lt;br /&gt;
==SEPTEMBER 6th MEETING==&lt;br /&gt;
OWASP supports Global Security Week (Sept. 3rd-9th) [http://www.globalsecurityweek.com/index.html Click Here More Info...]. In local support of this worldwide effort, the next NY/NJ OWASP Chapter meeting will be on &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;September 6th 5:30pm-9:00pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://www.amex.com AMERICAN STOCK EXCHANGE]===&lt;br /&gt;
Special thanks to: Doug Shin&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 86 Trinity Place, NY NY 10006 ~ [http://tinyurl.com/2c5ohu Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://signacert.com SIGNACERT] ~~ [http://www.ouncelabs.com OUNCE LABS] ~~ [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.fortifysoftware.com FORTIFY SOFTWARE]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Financial Real-Time Threats: Impacting Trading Floor Operations &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will aim to illustrate how individual application or&lt;br /&gt;
network layer threats, if combined correctly, can impact the workload&lt;br /&gt;
between the “pit” and departments such as settlements, processing and&lt;br /&gt;
accounting. Stemming from the lowest level of internal threat, systems on,&lt;br /&gt;
or behind, trading floor operations can be manipulated in ways that might&lt;br /&gt;
even go unnoticed. Such impact is possible due to the shear complexity of&lt;br /&gt;
the enterprise applications used, as well as the ways in which they are&lt;br /&gt;
inter-related.&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;JBroFuzz: Effective Fuzzing for Network and Web Applications &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the&lt;br /&gt;
needs of penetration testing. This presentation will aim to illustrate&lt;br /&gt;
efficient ways of fuzzing in order to minimize the amount of time spent in&lt;br /&gt;
discovering application and network protocol vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Dr. Yiannis Pavlosoglou is a Security Project Manager at&lt;br /&gt;
[http://www.irmplc.com Information Risk Management]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Stock fluctuation from an unrecognized influence. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Justine Bone-Aitel - [http://www.immunityinc.com Immunity Security]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Hackers...BotNets oh My!&amp;lt;/b&amp;gt;  Obtain a briefing on the current BotNet investigations etc.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: [http://newyork.fbi.gov/nyfohome.htm NYC FBI Cyber Crime Unit]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Remote Security&amp;lt;/b&amp;gt; &lt;br /&gt;
This industry talk will focus on the unique security challenges faced by Citigroup given the scale and breadth of their network (World's largest VPN). &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mark Clancy is Senior Vice President at [http://www.citigroup.com Citigroup]&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &lt;br /&gt;
&amp;lt;b&amp;gt;Blackhat/Defcon&amp;lt;/b&amp;gt; - during this debriefing we will discuss many of the hot bleeding edge INFOSEC topics that were covered at the [http://www.blackhat.com Blackhat] &amp;amp; [http://www.defcon.org Defcon] event Aug 1st - Aug 5th.  If you attended the event, look for your picture win a prize... if you missed this annual event, you will want to attend to get a briefing on the hot topics!!!&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &lt;br /&gt;
Tom Brennan, President OWASP NY/NJ Metro&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Global Security Week&amp;lt;/b&amp;gt;&lt;br /&gt;
What is the current state of Privacy on Web Application Security? &lt;br /&gt;
What should we be focusing on?&lt;br /&gt;
&lt;br /&gt;
Round-Table Panel - [http://www.globalsecurityweek.com/html/calendar.html GSW]&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt;[http://fs7.formsite.com/OWASP/form185804020/index.html RSVP IS REQUESTED] &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OCTOBER 25th MEETING==&lt;br /&gt;
Full Day, information security summit happening in New Jersey on October 25th. At this all day event, learn from industry experts on topics of information security.  There is no charge for this event. &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;October 25th 9:30am-4:30pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS]===&lt;br /&gt;
Special thanks to: Philip Varughese&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 295 N Maple Ave, Basking Ridge, NJ 07920 ~ [http://tinyurl.com/2vuh7f Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.cenzic.com CENZIC]&lt;br /&gt;
~~ [http://www.archer-tech.com ARCHER TECHNOLOGIES]  ~~ [http://www.intrepidusgroup.com INTREPIDUS GROUP]  ~~ [http://www.mandiant.com MANDIANT]&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Keynote&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Renato Delatorre, Verizon Wireless&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Social Engineering&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Kevin Mitnick&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;ISO 27001 What is it... Why do you care?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mahi Dontamsetti&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;VOIP - Can you hear me now?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Paul Rohmeyer&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Internet Fraud - War Stories&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mike Esposito&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Dig Your Own Hole: 12 Ways to Go Wrong with Java Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  Richard Bowen&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: TBD&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: TBD&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt; &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for upcoming meeting please provide submit your powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include a speaker BIO. If you wish to become a sponsor or co-sponsor please click on one of the below email addresses of our active board members.&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:jinxpuppy(at)gmail.com Tom Brennan] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:peter.perfetti(at)abnamro.com Pete Perfetti] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz] &lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:tom.ryan(at)providesecurity.com Tom Ryan] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pstern100(at)gmail.com Peter Stern] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:dougshin(at)gmail.com Douglas Shin]&lt;br /&gt;
Educational Advisors&lt;br /&gt;
*&amp;lt;b&amp;gt;New Jersey Institute of Technology:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Polytechnic University:&amp;lt;/b&amp;gt; [mailto:memon(at)poly.edu Nasir Memon]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006 &amp;lt;br&amp;gt;&lt;br /&gt;
973-202-0122&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.proactiverisk.com ~]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21186</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21186"/>
				<updated>2007-08-28T15:53:45Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}}  &lt;br /&gt;
&lt;br /&gt;
==SEPTEMBER 6th MEETING==&lt;br /&gt;
OWASP supports Global Security Week (Sept. 3rd-9th) [http://www.globalsecurityweek.com/index.html Click Here More Info...]. In local support of this worldwide effort, the next NY/NJ OWASP Chapter meeting will be on &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;September 6th 5:30pm-9:00pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://www.amex.com AMERICAN STOCK EXCHANGE]===&lt;br /&gt;
Special thanks to: Doug Shin&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 86 Trinity Place, NY NY 10006 ~ [http://tinyurl.com/2c5ohu Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://signacert.com SIGNACERT] ~~ [http://www.ouncelabs.com OUNCE LABS] ~~ [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.fortifysoftware.com FORTIFY SOFTWARE]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Financial Real-Time Threats: Impacting Trading Floor Operations &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will aim to illustrate how individual application or&lt;br /&gt;
network layer threats, if combined correctly, can impact the workload&lt;br /&gt;
between the “pit” and departments such as settlements, processing and&lt;br /&gt;
accounting. Stemming from the lowest level of internal threat, systems on,&lt;br /&gt;
or behind, trading floor operations can be manipulated in ways that might&lt;br /&gt;
even go unnoticed. Such impact is possible due to the shear complexity of&lt;br /&gt;
the enterprise applications used, as well as the ways in which they are&lt;br /&gt;
inter-related.&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;JBroFuzz: Effective Fuzzing for Network and Web Applications &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the&lt;br /&gt;
needs of penetration testing. This presentation will aim to illustrate&lt;br /&gt;
efficient ways of fuzzing in order to minimize the amount of time spent in&lt;br /&gt;
discovering application and network protocol vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Dr. Yiannis Pavlosoglou is a Security Project Manager at&lt;br /&gt;
[http://www.irmplc.com Information Risk Management]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Stock fluctuation from an unrecognized influence. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Justine Bone-Aitel - [http://www.immunityinc.com Immunity Security]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Hackers...BotNets oh My!&amp;lt;/b&amp;gt;  Obtain a briefing on the current BotNet investigations etc.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: [http://newyork.fbi.gov/nyfohome.htm NYC FBI Cyber Crime Unit]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Remote Security&amp;lt;/b&amp;gt; &lt;br /&gt;
This industry talk will focus on the unique security challenges faced by Citigroup given the scale and breadth of their network (World's largest VPN). &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mark Clancy is Senior Vice President at [http://www.citigroup.com Citigroup]&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &lt;br /&gt;
&amp;lt;b&amp;gt;Blackhat/Defcon&amp;lt;/b&amp;gt; - during this debriefing we will discuss many of the hot bleeding edge INFOSEC topics that were covered at the [http://www.blackhat.com Blackhat] &amp;amp; [http://www.defcon.org Defcon] event Aug 1st - Aug 5th.  If you attended the event, look for your picture win a prize... if you missed this annual event, you will want to attend to get a briefing on the hot topics!!!&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &lt;br /&gt;
Tom Brennan, President OWASP NY/NJ Metro&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Global Security Week&amp;lt;/b&amp;gt;&lt;br /&gt;
What is the current state of Privacy on Web Application Security? &lt;br /&gt;
What should we be focusing on?&lt;br /&gt;
&lt;br /&gt;
Round-Table Panel - [http://www.globalsecurityweek.com/html/calendar.html GSW]&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt;[http://fs7.formsite.com/OWASP/form185804020/index.html RSVP IS REQUESTED] &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OCTOBER 25th MEETING==&lt;br /&gt;
Full Day, information security summit happening in New Jersey on October 25th. At this all day event, learn from industry experts on topics of information security.  There is no charge for this event. &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;October 25th 9:30am-4:30pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS]===&lt;br /&gt;
Special thanks to: Philip Varughese&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 295 N Maple Ave, Basking Ridge, NJ 07920 ~ [http://tinyurl.com/2vuh7f Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.cenzic.com CENZIC]&lt;br /&gt;
~~ [http://www.archer-tech.com ARCHER TECHNOLOGIES]  ~~ [http://www.intrepidusgroup.com INTREPIDUS GROUP]&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Keynote&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Renato Delatorre, Verizon Wireless&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Social Engineering&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Kevin Mitnick&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;ISO 27001 What is it... Why do you care?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mahi Dontamsetti&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;VOIP - Can you hear me now?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Paul Rohmeyer&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Internet Fraud - War Stories&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mike Esposito&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Dig Your Own Hole: 12 Ways to Go Wrong with Java Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  Richard Bowen&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: TBD&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: TBD&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt; &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for upcoming meeting please provide submit your powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include a speaker BIO. If you wish to become a sponsor or co-sponsor please click on one of the below email addresses of our active board members.&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:jinxpuppy(at)gmail.com Tom Brennan] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:peter.perfetti(at)abnamro.com Pete Perfetti] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz] &lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:tom.ryan(at)providesecurity.com Tom Ryan] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pstern100(at)gmail.com Peter Stern] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:dougshin(at)gmail.com Douglas Shin]&lt;br /&gt;
Educational Advisors&lt;br /&gt;
*&amp;lt;b&amp;gt;New Jersey Institute of Technology:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Polytechnic University:&amp;lt;/b&amp;gt; [mailto:memon(at)poly.edu Nasir Memon]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006 &amp;lt;br&amp;gt;&lt;br /&gt;
973-202-0122&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.proactiverisk.com ~]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21014</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=21014"/>
				<updated>2007-08-23T11:46:09Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}}  &lt;br /&gt;
&lt;br /&gt;
==SEPTEMBER 6th MEETING==&lt;br /&gt;
OWASP supports Global Security Week (Sept. 3rd-9th) [http://www.globalsecurityweek.com/index.html Click Here More Info...]. In local support of this worldwide effort, the next NY/NJ OWASP Chapter meeting will be on &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;September 6th 5:30pm-9:00pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://www.amex.com AMERICAN STOCK EXCHANGE]===&lt;br /&gt;
Special thanks to: Doug Shin&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 86 Trinity Place, NY NY 10006 ~ [http://tinyurl.com/2c5ohu Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://signacert.com SIGNACERT] ~~ [http://www.ouncelabs.com OUNCE LABS] ~~ [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.fortifysoftware.com FORTIFY SOFTWARE]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Financial Real-Time Threats: Impacting Trading Floor Operations &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will aim to illustrate how individual application or&lt;br /&gt;
network layer threats, if combined correctly, can impact the workload&lt;br /&gt;
between the “pit” and departments such as settlements, processing and&lt;br /&gt;
accounting. Stemming from the lowest level of internal threat, systems on,&lt;br /&gt;
or behind, trading floor operations can be manipulated in ways that might&lt;br /&gt;
even go unnoticed. Such impact is possible due to the shear complexity of&lt;br /&gt;
the enterprise applications used, as well as the ways in which they are&lt;br /&gt;
inter-related.&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;JBroFuzz: Effective Fuzzing for Network and Web Applications &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the&lt;br /&gt;
needs of penetration testing. This presentation will aim to illustrate&lt;br /&gt;
efficient ways of fuzzing in order to minimize the amount of time spent in&lt;br /&gt;
discovering application and network protocol vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Dr. Yiannis Pavlosoglou is a Security Project Manager at&lt;br /&gt;
[http://www.irmplc.com Information Risk Management]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Stock fluctuation from an unrecognized influence. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER: Justine Bone-Aitel - [http://www.immunityinc.com Immunity Security]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Hackers...BotNets oh My!&amp;lt;/b&amp;gt;  Obtain a briefing on the current BotNet investigations etc.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: [http://newyork.fbi.gov/nyfohome.htm NYC FBI Cyber Crime Unit]&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Remote Security&amp;lt;/b&amp;gt; &lt;br /&gt;
This industry talk will focus on the unique security challenges faced by Citigroup given the scale and breadth of their network (World's largest VPN). &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mark Clancy is Senior Vice President at [http://www.citigroup.com Citigroup]&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &lt;br /&gt;
&amp;lt;b&amp;gt;Blackhat/Defcon&amp;lt;/b&amp;gt; - during this debriefing we will discuss many of the hot bleeding edge INFOSEC topics that were covered at the [http://www.blackhat.com Blackhat] &amp;amp; [http://www.defcon.org Defcon] event Aug 1st - Aug 5th.  If you attended the event, look for your picture win a prize... if you missed this annual event, you will want to attend to get a briefing on the hot topics!!!&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &lt;br /&gt;
Tom Brennan, President OWASP NY/NJ Metro&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Global Security Week&amp;lt;/b&amp;gt;&lt;br /&gt;
What is the current state of Privacy on Web Application Security? &lt;br /&gt;
What should we be focusing on?&lt;br /&gt;
&lt;br /&gt;
Round-Table Panel - [http://www.globalsecurityweek.com/html/calendar.html GSW]&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt;[http://fs7.formsite.com/OWASP/form185804020/index.html RSVP IS REQUESTED] &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OCTOBER 25th MEETING==&lt;br /&gt;
Full Day, information security summit happening in New Jersey on October 25th. At this all day event, learn from industry experts on topics of information security.  There is no charge for this event. &amp;lt;b&amp;gt; &amp;lt;u&amp;gt;October 25th 9:30am-4:30pm &amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS]===&lt;br /&gt;
Special thanks to: Philip Varughese&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 295 N Maple Ave, Basking Ridge, NJ 07920 ~ [http://tinyurl.com/2vuh7f Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event coSponsors:&amp;lt;/b&amp;gt; [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.cenzic.com CENZIC]&lt;br /&gt;
~~ [http://www.archer-tech.com ARCHER TECHNOLOGIES]  ~~ [http://www.intrepidusgroup.com INTREPIDUS GROUP]&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Social Engineering&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
SPEAKER: Kevin Mitnick&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;ISO 27001 What is it... Why do you care?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mahi Dontamsetti&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;VOIP - Can you hear me now?&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Paul Rohmeyer&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Internet Fraud - War Stories&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: Mike Esposito&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Dig Your Own Hole: 12 Ways to Go Wrong with Java Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  Richard Bowen&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: TBD&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: TBD&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt; &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for upcoming meeting please provide submit your powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include a speaker BIO. If you wish to become a sponsor or co-sponsor please click on one of the below email addresses of our active board members.&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:jinxpuppy(at)gmail.com Tom Brennan] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:peter.perfetti(at)abnamro.com Pete Perfetti] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz] &lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:tom.ryan(at)providesecurity.com Tom Ryan] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pstern100(at)gmail.com Peter Stern] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter] &lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:dougshin(at)gmail.com Douglas Shin]&lt;br /&gt;
Educational Advisors&lt;br /&gt;
*&amp;lt;b&amp;gt;New Jersey Institute of Technology:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Polytechnic University:&amp;lt;/b&amp;gt; [mailto:memon(at)poly.edu Nasir Memon]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006 &amp;lt;br&amp;gt;&lt;br /&gt;
973-202-0122&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.proactiverisk.com ~]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=18699</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=18699"/>
				<updated>2007-05-18T00:02:37Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}} &lt;br /&gt;
&lt;br /&gt;
==OWASP Presents at United Nations !!==&lt;br /&gt;
Hear World Leaders such as Ban Ki-Moon, Secretary General, United Nations,&lt;br /&gt;
Karen Evans, Administrator for e-Gov &amp;amp; IT, OMB, Executive Office of the President &lt;br /&gt;
and other industry leaders talk about information security at AIT's 19th Annual &lt;br /&gt;
Information Security Conference &amp;amp; Exhibit, in Celebration of World Information &lt;br /&gt;
Society Day June 4, 2007, United Nations HQs, NYC&lt;br /&gt;
&lt;br /&gt;
There's no charge to attend, pre-register now -&lt;br /&gt;
http://www.aitglobal.com/theform.html&lt;br /&gt;
&lt;br /&gt;
==Next Meeting NYC: JUNE 12th 6:00pm - 9:00pm ==&lt;br /&gt;
&lt;br /&gt;
===Sponsor: [http://www.dtcc.com The Depository Trust &amp;amp; Clearing Corp.]===&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 55 Water Street #26-139, NYC, NY 10041 - [http://tinyurl.com/33htrt Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event Co-Sponsors: [http://www.centuria.us CENTURIA] - [http://www.varonis.com/Products/Overview VARONIS] - [http://www.fortify.com FORTIFY] - [http://www.appsecinc.com APPLICATION SECURITY] - [http://www.accessitgroup.com ACCESSIT GROUP] - [http://www.aspectsecurity.com ASPECT SECURITY] &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event Speakers:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Keynote: Jeff Williams - OWASP Worldwide Chair&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker: Chris &amp;quot;Weld Pond&amp;quot; Wysopal - Binary Analysis &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker: Warren Axelrod - Secure Outsourcing&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker: Eric Uner - Application Firewalls&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker: Michael Feldman - .Net Secure Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt;[http://fs7.formsite.com/OWASP/form247457684/index.html RSVP IS REQUIRED]&amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Binary Analysis... its in the code&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &amp;lt;b&amp;gt;Chris (aka:Weld Pond) Wysopal, Co-Founder and Chief Technology Officer of [http://www.veracode.com Vercode]&amp;lt;/b&amp;gt;&lt;br /&gt;
He has given keynotes at computer security events and has testified on Capitol Hill on the subjects of government computer security and how vulnerabilities are discovered in software. He also has spoken as the keynote at West Point, to the Defense Information Systems Agency (DISA) and before the International Financial Futures and Options Exchange in London. His opinions on Internet security are highly sought after and most major print and media outlets have featured stories on Mr. Wysopal and his work. At Veracode, Mr. Wysopal is responsible for the security analysis capabilities of Veracode technology.&lt;br /&gt;
&lt;br /&gt;
Mr. Wysopal’s groundbreaking work in 2002 while at the company @stake was instrumental in developing industry guidelines for responsibly disclosing software security vulnerabilities. Mr. Wysopal, along with Steve Christey of MITRE, proposed an IETF RFC identified as the “Responsible Vulnerability Disclosure Process,” which became the foundation for the Organization for Internet Safety (OIS). Mr. Wysopal is a founder of OIS, which established industry standards for the responsible disclosure of Internet security vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
Mr. Wysopal is co-author of the award winning password auditing and recovery application @stake LC (L0phtCrack) which is currently used by more than 6,000 governments, military and corporate organizations worldwide. &lt;br /&gt;
&lt;br /&gt;
Mr. Wysopal began his career as a principal software engineer at Lotus Development Corporation where, in the mid 90’s, with the rise of the Internet, he realized the critical need for secure software. He and his colleagues then created the first security research think tank known as L0pht Heavy Industries, which was later acquired by @stake in 1999. He became the manager of @stake’s Research Group and later became @stake’s vice president of research and development where he led a world class team of security researchers tackling the problem of automating the process for finding and disclosing security vulnerabilities in software. He also managed @stake’s products group to develop new security tools focused on wireless, infrastructure and application security.&lt;br /&gt;
&lt;br /&gt;
In 2004, when @stake was acquired by Symantec, Mr. Wysopal became its director of development and was responsible for the engineering team that built binary analysis technology to find vulnerabilities in software. Mr. Wysopal wrote The Art of Software Security Testing: Identifying Security Flaws, published by Addison Wesley and Symantec Press in December 2006. Mr. Wysopal earned his Bachelor of Science Degree in Computer and Systems Engineering from Rensselaer Polytechnic Institute in Troy, New York.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;7-Things You Need to Know about Application Firewalls&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &amp;lt;b&amp;gt;Eric Uner, PhD is Chief Technical Officer and Chief Scientist of Sentinel Security Corporation a subsidiary of [http://www.centuria.us Centuria Corporation]&amp;lt;/b&amp;gt;  He is an industry-recognized scientific expert in the areas of embedded systems and information security. His research into applying biological defense models to computer systems and chaos theory led to the patented algorithms used in the HYDRA web cyber-defense appliance.&lt;br /&gt;
&lt;br /&gt;
Mr.Uner's work, including his software vulnerability equation and pseudo-random number generation algorithms, has been published in numerous journals internationally. He has also appeared in television interviews and broadcast radio as an expert in computer security.&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Programming Microsoft .Net for Security &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &amp;lt;b&amp;gt;Michael Feldman President, [http://www.dataritesys.com/home/default.asp Data Rite Systems Group]&amp;lt;/b&amp;gt;&lt;br /&gt;
Mike Feldman is an expert in creating highly customized, Web-based applications. He has more than 15 years experience in database technology and software development. Mike also was an instructor of client-server applications at Baruch College. Prior to founding Data-Rite, he worked as a project manager for TIAA-CREF, the largest pension holder in the country, developing enterprise level databases, and was a programmer for Monarch Financial Services&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Security Outsourcing: Issues, Concerns and suggestions on how to do it right &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: &amp;lt;b&amp;gt;C Warren Axelrod, Chief Privacy Officer &amp;amp; BISO, [http://www.ustrust.com US Trust Company]&amp;lt;/b&amp;gt;&lt;br /&gt;
Mr. Axelrod is a founder of the FS/ISAC (Financial Services Information Sharing and Analysis Center) and served two terms on its Board of Managers. The FS/ISAC is a public-private collaborative effort to share information on security threats, vulnerabilities and incidents among members and with government. He testified at a Congressional Hearing in 2001 on cyber security. He is on the Editorial Advisory Board of the ISSA Journal and several other advisory boards, such as for TMF (Technology Managers Forum) and I3P (Institute for Information Infrastructure Protection)  Mr. Axelrod was honored with a Computerworld Premier 100 IT Leaders Award in 2003 and his department's implementation of an intrusion detection system was given a Best in Class award. He has published two books on computer management and numerous articles on a variety of information technology and information security topics, including computer and network security, contingency planning, and computer-related risks. His third book, “Outsourcing Information Security,” which received a five-star rating on Amazon, was published in September 2004.&lt;br /&gt;
&lt;br /&gt;
He holds a PhD in managerial economics from the Johnson Graduate School of Management at Cornell University and honors bachelors and masters degrees in electrical engineering, economics and statistics from the University of Glasgow, Scotland. He is certified as a CISSP and CISM and has NASD Series 7 and Series 24 licenses.&lt;br /&gt;
&lt;br /&gt;
ABSTRACT:&lt;br /&gt;
&lt;br /&gt;
Full consideration of information security must be part of any IT outsourcing arrangement, whether the outsourced service or product is security-related or not, and whether the provider is local, in the same country, near shore or offshore. It must be examined even more closely when the service or product is in fact security-related and when the provider has access to sensitive information such as customer nonpublic personal information and company-confidential data, including intellectual property. Particular note will be made of implicit outsourcing arrangements such as occur with data aggregation, Web services, grid computing and open source. The presentation will review some of the predominant privacy and security risks of outsourcing and suggests how they might be mitigated&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt;[http://fs7.formsite.com/OWASP/form247457684/index.html RSVP IS REQUIRED] as space is limited and required by building security!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://tinyurl.com/33htrt GOOGLE MAP DIRECTIONS]&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:tomb(at)accessitgroup.com Tom Brennan] - AccessIT&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:peter.perfetti(at)abnamro.com Pete Perfetti] - ABN Amro&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz] - Net2s&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Tom.ryan(at)providesecurity.com Tom Ryan] - Foundstone&lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti] - M3 Security&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pster100(at)gmail.com Peter Stern] - IBM-ISS&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter] - Financial Services, Inc&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister] - Deloitte&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:stanguzik(at)yahoo.com Stan Guzik] - Thompson&lt;br /&gt;
Advisor(s)&lt;br /&gt;
*&amp;lt;b&amp;gt;New Jersey Institute of Technology:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Polytechnic University:&amp;lt;/b&amp;gt; [mailto:memon(at)poly.edu Nasir Memon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for a future meeting please provide a short abstract/paragraph of the talk or powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include speaker BIO. Or call 973-202-0122 if you wish to host a meeting or become a chapter meeting host or co-sponsor.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=18391</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=18391"/>
				<updated>2007-05-08T19:28:09Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* NY/NJ OWASP Chapter Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}} &lt;br /&gt;
&lt;br /&gt;
==Next Meeting NYC: JUNE 12th 6:00pm - 9:00pm ==&lt;br /&gt;
&lt;br /&gt;
===Sponsor: [http://www.dtcc.com The Depository Trust &amp;amp; Clearing Corp.]===&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 55 Water Street #26-139, NYC, NY 10041 - [http://tinyurl.com/33htrt Directions]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event Co-Sponsors: [http://www.centuria.us CENTURIA] - [http://www.varonis.com/Products/Overview VARONIS] - [http://www.fortify.com FORTIFY] - [http://www.appsecinc.com APPLICATION SECURITY] - [http://www.accessitgroup.com ACCESSIT GROUP]&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Event Speakers:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Keynote: Jeff Williams - OWASP Worldwide Chair&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker: Chris &amp;quot;Weld Pond&amp;quot; Wysopal - Binary Analysis &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker: Warren Axelrod - Secure Outsourcing&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker: Eric Uner - Application Firewalls&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker: Michael Feldman - .Net Secure Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;b&amp;gt;[http://fs7.formsite.com/OWASP/form247457684/index.html RSVP IS REQUIRED]&amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Binary Analysis... its in the code&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &amp;lt;b&amp;gt;Chris (aka:Weld Pond) Wysopal, Co-Founder and Chief Technology Officer of [http://www.veracode.com Vercode]&amp;lt;/b&amp;gt;&lt;br /&gt;
He has given keynotes at computer security events and has testified on Capitol Hill on the subjects of government computer security and how vulnerabilities are discovered in software. He also has spoken as the keynote at West Point, to the Defense Information Systems Agency (DISA) and before the International Financial Futures and Options Exchange in London. His opinions on Internet security are highly sought after and most major print and media outlets have featured stories on Mr. Wysopal and his work. At Veracode, Mr. Wysopal is responsible for the security analysis capabilities of Veracode technology.&lt;br /&gt;
&lt;br /&gt;
Mr. Wysopal’s groundbreaking work in 2002 while at the company @stake was instrumental in developing industry guidelines for responsibly disclosing software security vulnerabilities. Mr. Wysopal, along with Steve Christey of MITRE, proposed an IETF RFC identified as the “Responsible Vulnerability Disclosure Process,” which became the foundation for the Organization for Internet Safety (OIS). Mr. Wysopal is a founder of OIS, which established industry standards for the responsible disclosure of Internet security vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
Mr. Wysopal is co-author of the award winning password auditing and recovery application @stake LC (L0phtCrack) which is currently used by more than 6,000 governments, military and corporate organizations worldwide. &lt;br /&gt;
&lt;br /&gt;
Mr. Wysopal began his career as a principal software engineer at Lotus Development Corporation where, in the mid 90’s, with the rise of the Internet, he realized the critical need for secure software. He and his colleagues then created the first security research think tank known as L0pht Heavy Industries, which was later acquired by @stake in 1999. He became the manager of @stake’s Research Group and later became @stake’s vice president of research and development where he led a world class team of security researchers tackling the problem of automating the process for finding and disclosing security vulnerabilities in software. He also managed @stake’s products group to develop new security tools focused on wireless, infrastructure and application security.&lt;br /&gt;
&lt;br /&gt;
In 2004, when @stake was acquired by Symantec, Mr. Wysopal became its director of development and was responsible for the engineering team that built binary analysis technology to find vulnerabilities in software. Mr. Wysopal wrote The Art of Software Security Testing: Identifying Security Flaws, published by Addison Wesley and Symantec Press in December 2006. Mr. Wysopal earned his Bachelor of Science Degree in Computer and Systems Engineering from Rensselaer Polytechnic Institute in Troy, New York.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;7-Things You Need to Know about Application Firewalls&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &amp;lt;b&amp;gt;Eric Uner, PhD is Chief Technical Officer and Chief Scientist of Sentinel Security Corporation a subsidiary of [http://www.centuria.us Centuria Corporation]&amp;lt;/b&amp;gt;  He is an industry-recognized scientific expert in the areas of embedded systems and information security. His research into applying biological defense models to computer systems and chaos theory led to the patented algorithms used in the HYDRA web cyber-defense appliance.&lt;br /&gt;
&lt;br /&gt;
Mr.Uner's work, including his software vulnerability equation and pseudo-random number generation algorithms, has been published in numerous journals internationally. He has also appeared in television interviews and broadcast radio as an expert in computer security.&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Programming Microsoft .Net for Security &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &amp;lt;b&amp;gt;Michael Feldman President, [http://www.dataritesys.com/home/default.asp Data Rite Systems Group]&amp;lt;/b&amp;gt;&lt;br /&gt;
Mike Feldman is an expert in creating highly customized, Web-based applications. He has more than 15 years experience in database technology and software development. Mike also was an instructor of client-server applications at Baruch College. Prior to founding Data-Rite, he worked as a project manager for TIAA-CREF, the largest pension holder in the country, developing enterprise level databases, and was a programmer for Monarch Financial Services&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Security Outsourcing: Issues, Concerns and suggestions on how to do it right &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: &amp;lt;b&amp;gt;C Warren Axelrod, Chief Privacy Officer &amp;amp; BISO, [http://www.ustrust.com US Trust Company]&amp;lt;/b&amp;gt;&lt;br /&gt;
Mr. Axelrod is a founder of the FS/ISAC (Financial Services Information Sharing and Analysis Center) and served two terms on its Board of Managers. The FS/ISAC is a public-private collaborative effort to share information on security threats, vulnerabilities and incidents among members and with government. He testified at a Congressional Hearing in 2001 on cyber security. He is on the Editorial Advisory Board of the ISSA Journal and several other advisory boards, such as for TMF (Technology Managers Forum) and I3P (Institute for Information Infrastructure Protection)  Mr. Axelrod was honored with a Computerworld Premier 100 IT Leaders Award in 2003 and his department's implementation of an intrusion detection system was given a Best in Class award. He has published two books on computer management and numerous articles on a variety of information technology and information security topics, including computer and network security, contingency planning, and computer-related risks. His third book, “Outsourcing Information Security,” which received a five-star rating on Amazon, was published in September 2004.&lt;br /&gt;
&lt;br /&gt;
He holds a PhD in managerial economics from the Johnson Graduate School of Management at Cornell University and honors bachelors and masters degrees in electrical engineering, economics and statistics from the University of Glasgow, Scotland. He is certified as a CISSP and CISM and has NASD Series 7 and Series 24 licenses.&lt;br /&gt;
&lt;br /&gt;
ABSTRACT:&lt;br /&gt;
&lt;br /&gt;
Full consideration of information security must be part of any IT outsourcing arrangement, whether the outsourced service or product is security-related or not, and whether the provider is local, in the same country, near shore or offshore. It must be examined even more closely when the service or product is in fact security-related and when the provider has access to sensitive information such as customer nonpublic personal information and company-confidential data, including intellectual property. Particular note will be made of implicit outsourcing arrangements such as occur with data aggregation, Web services, grid computing and open source. The presentation will review some of the predominant privacy and security risks of outsourcing and suggests how they might be mitigated&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt;[http://fs7.formsite.com/OWASP/form247457684/index.html RSVP IS REQUIRED] as space is limited and required by building security!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://tinyurl.com/33htrt GOOGLE MAP DIRECTIONS]&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:tomb(at)accessitgroup.com Tom Brennan] - AccessIT&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:peter.perfetti(at)abnamro.com Pete Perfetti] - ABN Amro&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz] - Net2s&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Tom.ryan(at)providesecurity.com Tom Ryan] - Foundstone&lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti] - M3 Security&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pster100(at)gmail.com Peter Stern] - IBM-ISS&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter] - Financial Services, Inc&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister] - Deloitte&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:stanguzik(at)yahoo.com Stan Guzik] - Thompson&lt;br /&gt;
Advisor(s)&lt;br /&gt;
*&amp;lt;b&amp;gt;New Jersey Institute of Technology:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Polytechnic University:&amp;lt;/b&amp;gt; [mailto:memon(at)poly.edu Nasir Memon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for a future meeting please provide a short abstract/paragraph of the talk or powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include speaker BIO. Or call 973-202-0122 if you wish to host a meeting or become a chapter meeting host or co-sponsor.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=18091</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=18091"/>
				<updated>2007-04-26T23:30:43Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: /* Location Sponsor: [http://www.dtcc.com The Depository Trust &amp;amp; Clearing Corp.] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}} &lt;br /&gt;
&lt;br /&gt;
==Next Meeting NYC: JUNE 12th 6:00pm - 9:00pm ==&lt;br /&gt;
&lt;br /&gt;
===Location Sponsor: [http://www.dtcc.com The Depository Trust &amp;amp; Clearing Corp.]===&lt;br /&gt;
&amp;lt;b&amp;gt;Meeting Address:&amp;lt;/b&amp;gt; 55 Water Street #26-139, NYC, NY 10041 - [http://tinyurl.com/33htrt Directions]&lt;br /&gt;
&lt;br /&gt;
Event Co-Sponsors:&lt;br /&gt;
[http://www.centuria.us Centuria] - [http://en.wikipedia.org/wiki/Sponsor YOUR COMPANY?] - [http://en.wikipedia.org/wiki/Sponsor YOUR COMPANY?] - [http://en.wikipedia.org/wiki/Sponsor YOUR COMPANY?]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://fs7.formsite.com/OWASP/form247457684/index.html RSVP IS REQUIRED]&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Binary Analysis... its in the code&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &amp;lt;b&amp;gt;Chris (aka:Weld Pond) Wysopal, Co-Founder and Chief Technology Officer of [http://www.veracode.com Vercode]&amp;lt;/b&amp;gt;&lt;br /&gt;
He has given keynotes at computer security events and has testified on Capitol Hill on the subjects of government computer security and how vulnerabilities are discovered in software. He also has spoken as the keynote at West Point, to the Defense Information Systems Agency (DISA) and before the International Financial Futures and Options Exchange in London. His opinions on Internet security are highly sought after and most major print and media outlets have featured stories on Mr. Wysopal and his work. At Veracode, Mr. Wysopal is responsible for the security analysis capabilities of Veracode technology.&lt;br /&gt;
&lt;br /&gt;
Mr. Wysopal’s groundbreaking work in 2002 while at the company @stake was instrumental in developing industry guidelines for responsibly disclosing software security vulnerabilities. Mr. Wysopal, along with Steve Christey of MITRE, proposed an IETF RFC identified as the “Responsible Vulnerability Disclosure Process,” which became the foundation for the Organization for Internet Safety (OIS). Mr. Wysopal is a founder of OIS, which established industry standards for the responsible disclosure of Internet security vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
Mr. Wysopal is co-author of the award winning password auditing and recovery application @stake LC (L0phtCrack) which is currently used by more than 6,000 governments, military and corporate organizations worldwide. &lt;br /&gt;
&lt;br /&gt;
Mr. Wysopal began his career as a principal software engineer at Lotus Development Corporation where, in the mid 90’s, with the rise of the Internet, he realized the critical need for secure software. He and his colleagues then created the first security research think tank known as L0pht Heavy Industries, which was later acquired by @stake in 1999. He became the manager of @stake’s Research Group and later became @stake’s vice president of research and development where he led a world class team of security researchers tackling the problem of automating the process for finding and disclosing security vulnerabilities in software. He also managed @stake’s products group to develop new security tools focused on wireless, infrastructure and application security.&lt;br /&gt;
&lt;br /&gt;
In 2004, when @stake was acquired by Symantec, Mr. Wysopal became its director of development and was responsible for the engineering team that built binary analysis technology to find vulnerabilities in software. Mr. Wysopal wrote The Art of Software Security Testing: Identifying Security Flaws, published by Addison Wesley and Symantec Press in December 2006. Mr. Wysopal earned his Bachelor of Science Degree in Computer and Systems Engineering from Rensselaer Polytechnic Institute in Troy, New York.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;7-Things You Need to Know about Application Firewalls&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  &amp;lt;b&amp;gt;Eric Uner, PhD is Chief Technical Officer and Chief Scientist of Sentinel Security Corporation a subsidiary of [http://www.centuria.us Centuria Corporation]&amp;lt;/b&amp;gt;  He is an industry-recognized scientific expert in the areas of embedded systems and information security. His research into applying biological defense models to computer systems and chaos theory led to the patented algorithms used in the HYDRA web cyber-defense appliance.&lt;br /&gt;
&lt;br /&gt;
Mr.Uner's work, including his software vulnerability equation and pseudo-random number generation algorithms, has been published in numerous journals internationally. He has also appeared in television interviews and broadcast radio as an expert in computer security.&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Programming Microsoft .Net for Security &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:  Michael Feldman President, [http://www.dataritesys.com/home/default.asp Data Rite Systems Group]&lt;br /&gt;
Mike Feldman is an expert in creating highly customized, Web-based applications. He has more than 15 years experience in database technology and software development. Mike also was an instructor of client-server applications at Baruch College. Prior to founding Data-Rite, he worked as a project manager for TIAA-CREF, the largest pension holder in the country, developing enterprise level databases, and was a programmer for Monarch Financial Services&lt;br /&gt;
&lt;br /&gt;
-- &lt;br /&gt;
&lt;br /&gt;
TOPIC: &amp;lt;b&amp;gt;Security outsourcing: Issues, Concerns and how to do it right &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO: &amp;lt;b&amp;gt;C Warren Axelrod, Chief Privacy Officer &amp;amp; BISO, US Trust Company&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mr. Axelrod is a founder of the FS/ISAC (Financial Services Information Sharing and Analysis Center) and served two terms on its Board of Managers. The FS/ISAC is a public-private collaborative effort to share information on security threats, vulnerabilities and incidents among members and with government. He testified at a Congressional Hearing in 2001 on cyber security. He is on the Editorial Advisory Board of the ISSA Journal and several other advisory boards, such as for TMF (Technology Managers Forum) and I3P (Institute for Information Infrastructure Protection)&lt;br /&gt;
&lt;br /&gt;
Mr. Axelrod was honored with a Computerworld Premier 100 IT Leaders Award in 2003 and his department's implementation of an intrusion detection system was given a Best in Class award. He has published two books on computer management and numerous articles on a variety of information technology and information security topics, including computer and network security, contingency planning, and computer-related risks. His third book, “Outsourcing Information Security,” which received a five-star rating on Amazon, was published in September 2004.&lt;br /&gt;
&lt;br /&gt;
He holds a PhD in managerial economics from the Johnson Graduate School of Management at Cornell University and honors bachelors and masters degrees in electrical engineering, economics and statistics from the University of Glasgow, Scotland. He is certified as a CISSP and CISM and has NASD Series 7 and Series 24 licenses.&lt;br /&gt;
&lt;br /&gt;
ABSTRACT:&lt;br /&gt;
&lt;br /&gt;
Full consideration of information security must be part of any IT outsourcing arrangement, whether the outsourced service or product is security-related or not, and whether the provider is local, in the same country, near shore or offshore. It must be examined even more closely when the service or product is in fact security-related and when the provider has access to sensitive information such as customer nonpublic personal information and company-confidential data, including intellectual property. Particular note will be made of implicit outsourcing arrangements such as occur with data aggregation, Web services, grid computing and open source. The presentation will review some of the predominant privacy and security risks of outsourcing and suggests how they might be mitigated&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; Meetings are FREE and open to the PUBLIC - &amp;lt;/b&amp;gt;[http://fs7.formsite.com/OWASP/form247457684/index.html RSVP IS REQUIRED] as space is limited and required by building security!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://tinyurl.com/33htrt GOOGLE MAP DIRECTIONS]&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
TOPIC:&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO:&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:jinxpuppy(at)gmail.com Tom Brennan]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:peter.perfetti(at)abnamro.com Pete Perfetti]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:pster100(at)gmail.com Peter Stern]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:Tom.ryan(at)providesecurity.com Tom Ryan]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:stanguzik(at)yahoo.com Stan Guzik]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To submit educational topic for a future meeting please provide a short abstract/paragraph of the talk or powerpoint using the [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include speaker BIO. Or call 973-202-0122 if you wish to host a meeting or become a chapter meeting host or co-sponsor.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=17684</id>
		<title>New Jersey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Jersey&amp;diff=17684"/>
				<updated>2007-04-03T15:33:01Z</updated>
		
		<summary type="html">&lt;p&gt;Mdontamsetti: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=NY/NJ |extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newjersey|emailarchives=http://lists.owasp.org/pipermail/owasp-newjersey}} To submit educational topic for a future meeting please provide a short paragraph of the talk or powerpoint and speaker BIO and email [mailto:jinxpuppy(at)gmail.com Submit Talk] or call 973-202-0122 if you wish to host a meeting or become a chapter sponsor.&lt;br /&gt;
&lt;br /&gt;
= NY/NJ OWASP Chapter Leaders =&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:jinxpuppy(at)gmail.com Tom Brennan]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:peter.perfetti(at)abnamro.com Pete Perfetti]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:BrianPei(at)yahoo.com Brian Peister]&lt;br /&gt;
*&amp;lt;b&amp;gt;Membership Chair:&amp;lt;/b&amp;gt; [mailto:santoniewicz(at)net2s.com Steve Antoniewicz]&lt;br /&gt;
*&amp;lt;b&amp;gt;PR Chair:&amp;lt;/b&amp;gt; [mailto:pster100(at)gmail.com Peter Stern]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications:&amp;lt;/b&amp;gt; [mailto:KReiter(at)insidefsi.net Kevin Reiter]&lt;br /&gt;
*&amp;lt;b&amp;gt;Project Chair:&amp;lt;/b&amp;gt; [mailto:Tom.ryan(at)providesecurity.com Tom Ryan]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member/Projects:&amp;lt;/b&amp;gt; [mailto:oe2(at)njit.edu Osama Eljabiri]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member/Programs:&amp;lt;/b&amp;gt; [mailto:mdontamsetti(at)gmail.com Mahi Dontamsetti]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=2007 MEETINGS=&lt;br /&gt;
&lt;br /&gt;
==APRIL 17th 6pm-9pm EST==&lt;br /&gt;
'''WHERE'''&lt;br /&gt;
&lt;br /&gt;
[http://www.ubs.com UBS] - 499 Washington Ave, Jersey City, NJ [http://tinyurl.com/2k9hnt DIRECTIONS]&lt;br /&gt;
&lt;br /&gt;
April Event Sponsors: [http://www.whitehatsec.com White Hat Security], [http://www.accessitgroup.com AccessIT Group], [http://www.ubs.com UBS], [http://www.xceedium.com/solutions/Solutions_SecurityContainment.php Xceedium], [http://en.wikipedia.org/wiki/Sponsor Your Company Here], [http://en.wikipedia.org/wiki/Sponsor Your Company Here]&lt;br /&gt;
&lt;br /&gt;
'''AGENDA'''  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;6:00pm - 7:00pm Speaker:&amp;lt;/u&amp;gt; Marc Maiffret, Founder/CTO &amp;amp; Chief Hacking Officer &amp;lt;/b&amp;gt;[http://www.eeye.com eEye Digital Security] As eEye Digital Security’s Co-Founder/CTO and Chief Hacking Officer, Marc Maiffret has been a driving force in the vision and continuous innovation for eEye’s product development and vulnerability research efforts since the company’s inception in 1998. Long regarded as a security expert and thought leader in vulnerability assessment and endpoint security, Marc Maiffret also leads the efforts of eEye’s world renowned Research Team. In addition, Mr. Maiffret speaks regularly on the state of security across the globe, including several appearances before Congress, where he has testified on information policies and security threats posed to both public and private infrastructures. Mr. Maiffret’s role in vulnerability research, education and product innovation has been reflected in the numerous awards and distinguishments that eEye Digital Security continuously receives.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract: “It’s More Than a Microsoft World.”&amp;lt;/b&amp;gt;  &lt;br /&gt;
In his presentation, he will discuss the state of security and the changing nature of threats as he details why, Software vendors such as Microsoft, Apple, Symantec, IBM and McAfee are increasingly plagued with critical exploits and zero-day attacks. As the window of remediation decreases and the attack target widens, security response teams fall short of the finish line, leaving millions of users vulnerable.  Mr. Maiffret will explain the evolution of attack vectors and their impact on the nature of security, the challenge facing software vendors and the overall impact this cycle of events has on network security professionals today. &lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;7:00 - 8:00pm Speaker Tom Brennan &amp;lt;/u&amp;gt; - NY/NJ OWASP Metro President/AccessIT Group Risk Practice Manager - [http://www.accessitgroup.com AccessIT]&amp;lt;/b&amp;gt;. Tom Brennan specializes in providing business risk assessments and penetration testing of critical IT infrastructures. His technical focus includes web application, VOIP and Wireless. Tom’s assessment methodology is based on the National Security Agency INFOSEC Assessment Methodology and the Open Source Security Testing Methodology Manual (OSSTMM). Tom is has been featured on NYC Channel 5, Channel 7 as a subject matter security expert&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract: OWASP Version 2 Testing Guide&amp;lt;/b&amp;gt;&lt;br /&gt;
This talk will discuss the co-authored release of the new OWASP Testing Guide. The open-source (free) goal was to create a &amp;quot;best practices&amp;quot; penetration testing framework which users can implement in their own organizations and a &amp;quot;low level&amp;quot; penetration testing guide that describes how to find certain issues. [http://www.owasp.org/index.php/Image:OWASP_Testing_Guide_v2_pdf.zip Get Your Copy NOW]&lt;br /&gt;
Tom will also discuss the OWASP chapter goals for 2007 and results of the 2007 member survey.&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;8:00pm - 9:00pm Speaker&amp;lt;/u&amp;gt; Jeremiah Grossman, Founder/CTO - [http://www.whitehatsec.com White Hat]&amp;lt;/b&amp;gt;&lt;br /&gt;
Mr. Grossman founded WhiteHat Security in 2001. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo! responsible for performing security reviews on the company's hundreds of web applications. As one of the world's busiest web properties, with over 17,000 web servers for customer access and 600 web applications, the highest level of security was required. Before Yahoo!, Mr. Grossman worked for Amgen, Inc. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract: “HACKING INTRANET WEBSITES FROM THE OUTSIDE” &amp;lt;/b&amp;gt;&lt;br /&gt;
This hour-long presentation will feature Jeremiah Grossman, WhiteHat Security Founder and CTO.&lt;br /&gt;
Mr. Grossman will demonstrate: How a user is first infected or attacked using a malicious Web page or Cross-Site Scripting vulnerability; How a Web browser can be completely controlled or monitored remotely. How a Web browser can be used as a stepping stone to perform network reconnaissance on internal networks; and,&lt;br /&gt;
How to exploit internal machines using a compromised Web browser&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
After the event you are invited to walk several doors down to &amp;lt;b&amp;gt;Dorrians Tavern&amp;lt;/b&amp;gt; where we will continue networking with your industry peers over a pint. &amp;quot;Cheers&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[http://tinyurl.com/2k9hnt DIRECTIONS]&lt;br /&gt;
&lt;br /&gt;
For Mass transit, the Pavonia Ave Path stop is across the street and the&lt;br /&gt;
Pavonia / Newport Mall Light Rail is behind the building.&lt;br /&gt;
&lt;br /&gt;
Driving Directions to Newport&lt;br /&gt;
&lt;br /&gt;
From Holland Tunnel - At the first light out of the Tunnel, make a right&lt;br /&gt;
(by the Gas Station). At the next light, make a right onto 18th Street.&lt;br /&gt;
18th Street will turn into Washington Boulevard. At the fourth light,&lt;br /&gt;
make a right onto 6th Street. Take the next right onto Mall Drive East.&lt;br /&gt;
Open parking lot is straight ahead.&lt;br /&gt;
&lt;br /&gt;
From Lincoln Tunnel - Upon exiting the Tunnel, immediately get into the&lt;br /&gt;
far right lane. Follow the Hoboken exit sign and ramp. At the first&lt;br /&gt;
light, the street becomes Willow Avenue. Continue straight through the&lt;br /&gt;
light. Proceed on Willow Avenue for approximately 1.5 miles. Continue to&lt;br /&gt;
the end. Turn right onto Observer Highway. At the first light, Henderson&lt;br /&gt;
Avenue, turn left. Stay on Henderson Avenue, under rail tracks, at first&lt;br /&gt;
light, 18th Street, turn left. Continue on 18th Street which turns into&lt;br /&gt;
Washington Boulevard.&lt;br /&gt;
&lt;br /&gt;
From New Jersey Turnpike - Take the NJ Turnpike to exit 14C, the Holland&lt;br /&gt;
Tunnel. After the toll, continue toward the Holland Tunnel. At the&lt;br /&gt;
bottom of the ramp, turn right onto Jersey Avenue. Then immediately bear&lt;br /&gt;
left up Newport Centre Mall ramp. Follow signs to the Parking Garage.&lt;br /&gt;
&lt;br /&gt;
From Garden State Parkway North - Exit at Route 22 Eastbound Exit 140.&lt;br /&gt;
Stay on Route 22 East until Route 1&amp;amp;9 North onto the Pulaski Skyway. At&lt;br /&gt;
the bottom of ramp, coming off Skyway going to the Holland Tunnel turn&lt;br /&gt;
right. Immediately bear left up the ramp to Newport Centre Mall.&lt;br /&gt;
&lt;br /&gt;
From Garden State Parkway South - Exit at Parkway at Exit 145 onto Route&lt;br /&gt;
280 East. Stay on Route 280 until it ends. Then take Route 508 towards&lt;br /&gt;
Jersey City. Route 508 joins Route 7, then after crossing bridges at the&lt;br /&gt;
first traffic circle follow Route 1&amp;amp;9 North to Holland Tunnel. At the&lt;br /&gt;
bottom of the ramp, turn right onto Jersey Avenue. Then bear to your&lt;br /&gt;
left up the ramp to Newport Centre.&lt;br /&gt;
&lt;br /&gt;
From Route 3 (Eastbound) - Follow Route 3 towards Lincoln Tunnel/NYC.&lt;br /&gt;
Stay in the far right lane. Exit at the Weehawken/Hoboken Exit ramp. Go&lt;br /&gt;
through first traffic light bear slightly right to proceed down the&lt;br /&gt;
hill. At the botton of the hill bear right again proceeding on the&lt;br /&gt;
Boulevard. Follow to the end and make a right onto 14th Street. Then&lt;br /&gt;
make the first left onto Willow Ave. Proceed on Willow Avenue for&lt;br /&gt;
approximately 1.5 miles. Continue to the end. Turn right onto Observer&lt;br /&gt;
Highway. At the first light, Henderson Avenue, turn left. Stay on&lt;br /&gt;
Henderson Avenue, under rail tracks, at first light, 18th Street, turn&lt;br /&gt;
left. Continue on 18th Street which turns into Washington Boulevard.&lt;br /&gt;
Stay in right lane and continue on into Newport Centre Mall Parking&lt;br /&gt;
Garage.&lt;br /&gt;
&lt;br /&gt;
From George Washington Bridge - Follow the sign off the bridge for NJ&lt;br /&gt;
Turnpike South. Take NJ Turnpike to Route 78 East, Exit 14-14C. Exit&lt;br /&gt;
main Turnpike onto Route 78 East for 14C-Holland Tunnel. After the toll&lt;br /&gt;
at 14C continue towards the Holland Tunnel. At the bottom of the ramp&lt;br /&gt;
going to the Holland Tunnel Plaza, at first light, make right onto&lt;br /&gt;
Jersey Avenue. Then immediately bear left up the ramp to Newport Centre&lt;br /&gt;
Mall.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==JUNE==&lt;br /&gt;
'''WHERE'''&lt;br /&gt;
TBD [http://maps.google.com DIRECTIONS] - [http://fs19.formsite.com/NJOWASP/RSVP RSVP]&lt;br /&gt;
&lt;br /&gt;
'''TOPICS'''&lt;br /&gt;
&lt;br /&gt;
Topic: TBD - Speaker TBD - [mailto:jinxpuppy(at)gmail.com SUBMIT TALK OUTLINE + SPEAKER BIO]&lt;br /&gt;
&lt;br /&gt;
Topic: TBD - Speaker TBD - [mailto:jinxpuppy(at)gmail.com SUBMIT TALK OUTLINE + SPEAKER BIO]&lt;br /&gt;
&lt;br /&gt;
Topic: TBD - Speaker TBD - [mailto:jinxpuppy(at)gmail.com SUBMIT TALK OUTLINE + SPEAKER BIO]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SEPTEMBER==&lt;br /&gt;
'''WHERE'''&lt;br /&gt;
TBD [http://maps.google.com DIRECTIONS] - [http://fs19.formsite.com/NJOWASP/RSVP RSVP]&lt;br /&gt;
&lt;br /&gt;
'''TOPICS'''&lt;br /&gt;
&lt;br /&gt;
Topic: TBD - Speaker TBD - [mailto:jinxpuppy(at)gmail.com SUBMIT TALK OUTLINE + SPEAKER BIO]&lt;br /&gt;
&lt;br /&gt;
Topic: TBD - Speaker TBD - [mailto:jinxpuppy(at)gmail.com SUBMIT TALK OUTLINE + SPEAKER BIO]&lt;br /&gt;
&lt;br /&gt;
Topic: TBD - Speaker TBD - [mailto:jinxpuppy(at)gmail.com SUBMIT TALK OUTLINE + SPEAKER BIO]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==NOVEMBER==&lt;br /&gt;
'''WHERE'''&lt;br /&gt;
TBD [http://maps.google.com DIRECTIONS] - [http://fs19.formsite.com/NJOWASP/RSVP RSVP]&lt;br /&gt;
&lt;br /&gt;
'''TOPICS'''&lt;br /&gt;
&lt;br /&gt;
Topic: TBD - Speaker TBD - [mailto:jinxpuppy(at)gmail.com SUBMIT TALK OUTLINE + SPEAKER BIO]&lt;br /&gt;
&lt;br /&gt;
Topic: TBD - Speaker TBD - [mailto:jinxpuppy(at)gmail.com SUBMIT TALK OUTLINE + SPEAKER BIO]&lt;br /&gt;
&lt;br /&gt;
Topic: TBD - Speaker TBD - [mailto:jinxpuppy(at)gmail.com SUBMIT TALK OUTLINE + SPEAKER BIO]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter mailing address is:&lt;br /&gt;
NY/NJ Metro OWASP&lt;br /&gt;
759 Bloomfield Ave #172&lt;br /&gt;
West Caldwell, New Jersey 07006&lt;br /&gt;
General: 973-202-0122&lt;br /&gt;
eMail: [mailto:jinxpuppy@gmail.com General]&lt;/div&gt;</summary>
		<author><name>Mdontamsetti</name></author>	</entry>

	</feed>