<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mjidhage</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mjidhage"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Mjidhage"/>
		<updated>2026-05-08T13:06:50Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=204809</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=204809"/>
				<updated>2015-12-07T13:07:17Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
= Date =&lt;br /&gt;
Tuesday December 8th, 2015&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[[image:fasad.png|300px]] &lt;br /&gt;
 &lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#00549E; color:white&amp;quot;|&amp;lt;h2&amp;gt;&amp;lt;span style=&amp;quot;color:white&amp;quot;&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/span&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS &amp;amp; COFFEE AND BUN'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;Bring a computer with a browser&lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Knobloch | OWASP Security Knowledge Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Knobloch&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;Optional: bring a computer&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;Bring a laptop with windows 7 or later (or Mac/Linux with Windows VM works too)&lt;br /&gt;
Install VMware player. 2 USB sticks or USB HDD 8 GB+. Optional: Bring a &amp;quot;Victim drive&amp;quot; (your spouse's, colleague's, best friend's, enemy's) to analyze.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Knowledge Framework, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Knowledge Framework, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Baked char with corn cream, brussels sprouts and lobster foam''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:00-13:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Welcome!&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:15-14:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orrù; | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrù&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:15-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | Your Scripts in My Page - What Could Possibly Go Wrong?]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:00-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee and pastry''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 16:30-17:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 17:15-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, SANDWICH, MINGLE, AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;br /&gt;
&lt;br /&gt;
= Survey =&lt;br /&gt;
[[OGD15_Survey | Survey]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204808</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204808"/>
				<updated>2015-12-07T12:21:23Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Abstract */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to [[OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Mario Heiderich (@0x6D6172696F) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
= Michele Orr&amp;amp;#xF9; (@antisnatchor) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orrù a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
= Marie Moe (@MarieGMoe) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns (@datenkeller) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss (@rbodforss) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Rikard Bodforss is working for the city of Gothenburg recycling and water (Förvaltningen Kretslopp och vatten) as IT manager. He has over two decades of experience from the IT industry and most of that working with Information- and IT-security. He is former head of forensics for Volvo Group and has extensive experience working with incident response and forensic investigations. As a security advisor, he worked with companies from all kinds of sectors, including automotive, finance, medical, pharma, energy and public sector.&lt;br /&gt;
He holds CISSP and CISA certifications and was awarded the ISACA Thomas Fitzgerald award in 2009 for the highest score in the world on the CISA exam.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Rikard will guide you through the basics of a forensic investigation from acquisition to triage analysis, using open source or free tools. The workshop will be based on a scenario where we will go through the steps of an investigation from planning to report writing. The level of the workshop is aimed at an audience with limited (no) experience in forensics, but with a good understanding of computers, hardware and operating systems. After the workshop you will know how to handle the most critical part of an investigation, the acquisition, and how to proceed from there.&lt;br /&gt;
IMPORTANT: Bring a laptop with Windows 7 installed (or a virtual host with Windows 7 on an OS of your choice). Install VMware player. Also 2 USB sticks or USB HDD 8 GB+. Optional: Bring a &amp;quot;Victim drive&amp;quot; (your spouse's, colleague's, best friend's, enemy's) to analyze.&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch (@knoblochmartin) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Martin is an independent security consultant and owner of PervaSec (http://www.pervasec.nl). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
Martin got involved in OWASP in 2006. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees.&lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands!&lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
The OWASP Security Knowledge Frwamework&lt;br /&gt;
There are a lot of books about how to write secure code, and a lot of standards and regulations. But do they succeed in getting the developers writing more secure code? Developers are about developing, and developing means staying up to date on frameworks, tools, best practices. Just to throw a several hundred page book on their table and expect them to read it does not work. Nor does a list of several hundred items 'what to do / not to do' work. They need a way to find information agile, dynamically, to the point, addressing the problem they are dealing with at this moment. That is what the SKF does!&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. Use SKF to learn and integrate security by design in your web application.In a nutshell:&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
- Security support pre-development (Security by design, early feedback of possible security issues&lt;br /&gt;
- Security support post-development(Double check your code by means of the OWASP ASVS checklists)&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
During the workshop we discus the different secure code standards, tools and guides and how this knowledge comes together in the Security Knowledge Framework and how to implement the SKF in your (customers) development life-cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan (@Duggan4Sean) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP Gothenburg Day 2015]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204501</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204501"/>
				<updated>2015-12-03T19:58:40Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to [[OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Mario Heiderich (@0x6D6172696F) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
= Michele Orr&amp;amp;#xF9; (@antisnatchor) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orrù a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
= Marie Moe (@MarieGMoe) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns (@datenkeller) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss (@rbodforss) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch (@knoblochmartin) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan (@Duggan4Sean) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP Gothenburg Day 2015]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204500</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204500"/>
				<updated>2015-12-03T19:58:02Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Martin Knobloch */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to [[OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Mario Heiderich (@0x6D6172696F) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
= Michele Orr&amp;amp;#xF9; (@antisnatchor) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orrù a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
= Marie Moe (@MarieGMoe) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan (@Duggan4Sean) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
= Martin Johns (@datenkeller) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss (@rbodforss) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch (@knoblochmartin) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP Gothenburg Day 2015]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204498</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204498"/>
				<updated>2015-12-03T19:57:13Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Rikard Bodforss */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to [[OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Mario Heiderich (@0x6D6172696F) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
= Michele Orr&amp;amp;#xF9; (@antisnatchor) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orrù a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
= Marie Moe (@MarieGMoe) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan (@Duggan4Sean) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
= Martin Johns (@datenkeller) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss (@rbodforss) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP Gothenburg Day 2015]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204497</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204497"/>
				<updated>2015-12-03T19:56:39Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Martin Johns */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to [[OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Mario Heiderich (@0x6D6172696F) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
= Michele Orr&amp;amp;#xF9; (@antisnatchor) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orrù a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
= Marie Moe (@MarieGMoe) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan (@Duggan4Sean) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
= Martin Johns (@datenkeller) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP Gothenburg Day 2015]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204496</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204496"/>
				<updated>2015-12-03T19:55:57Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Sean Duggan */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to [[OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Mario Heiderich (@0x6D6172696F) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
= Michele Orr&amp;amp;#xF9; (@antisnatchor) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orrù a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
= Marie Moe (@MarieGMoe) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan (@Duggan4Sean) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP Gothenburg Day 2015]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204495</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204495"/>
				<updated>2015-12-03T19:54:44Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Marie Moe */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to [[OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Mario Heiderich (@0x6D6172696F) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
= Michele Orr&amp;amp;#xF9; (@antisnatchor) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orrù a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
= Marie Moe (@MarieGMoe) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP Gothenburg Day 2015]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204494</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204494"/>
				<updated>2015-12-03T19:53:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Michele Orr&amp;amp;#xF9; */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to [[OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Mario Heiderich (@0x6D6172696F) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
= Michele Orr&amp;amp;#xF9; (@antisnatchor) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orrù a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP Gothenburg Day 2015]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204493</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204493"/>
				<updated>2015-12-03T19:52:42Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Mario Heiderich */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Back to [[OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Mario Heiderich (@0x6D6172696F) =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
= Michele Orr&amp;amp;#xF9; =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orrù a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP Gothenburg Day 2015]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=204323</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=204323"/>
				<updated>2015-12-02T20:48:59Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
= Date =&lt;br /&gt;
Tuesday December 8th, 2015&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[[image:fasad.png|300px]] &lt;br /&gt;
 &lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#00549E; color:white&amp;quot;|&amp;lt;h2&amp;gt;&amp;lt;span style=&amp;quot;color:white&amp;quot;&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/span&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS &amp;amp; COFFEE AND SANDWICH'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Knobloch | OWASP Security Knowledge Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Knobloch&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Knowledge Framework, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Knowledge Framework, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:00-13:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Welcome!&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:15-14:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:15-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | Your Scripts in My Page - What Could Possibly Go Wrong?]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:00-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 16:30-17:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 17:15-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;br /&gt;
&lt;br /&gt;
= Survey =&lt;br /&gt;
[[OGD15_Survey | Survey]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204322</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=204322"/>
				<updated>2015-12-02T20:45:34Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Michele Orrú =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Shepherd&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Martin Knobloch =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Knowledge Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Security_Knowledge_Framework&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=204083</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=204083"/>
				<updated>2015-11-30T21:22:00Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
= Date =&lt;br /&gt;
Tuesday December 8th, 2015&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[[image:fasad.png|300px]] &lt;br /&gt;
 &lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#00549E; color:white&amp;quot;|&amp;lt;h2&amp;gt;&amp;lt;span style=&amp;quot;color:white&amp;quot;&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/span&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS &amp;amp; COFFEE AND SANDWICH'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers | TBD]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;TBD&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''TBD'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; TBD &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:00-13:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Welcome!&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:15-14:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:15-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | Your Scripts in My Page - What Could Possibly Go Wrong?]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:00-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 16:30-17:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 17:15-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=204082</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=204082"/>
				<updated>2015-11-30T21:21:10Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
= Date =&lt;br /&gt;
Tuesday December 8th, 2015&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[[image:fasad.png|300px]] &lt;br /&gt;
 &lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#00549E; color:white&amp;quot;|&amp;lt;h2&amp;gt;&amp;lt;span style=&amp;quot;color:white&amp;quot;&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/span&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS &amp;amp; COFFEE AND SANDWICH'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers | TBD]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;TBD&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''TBD'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; TBD &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:00-13:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Welcome!&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:15-14:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:15-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | Your Scripts in My Page - What Could Possibly Go Wrong?]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:00-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 16:30-17:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203752</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203752"/>
				<updated>2015-11-23T19:41:09Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
= Date =&lt;br /&gt;
Tuesday December 8th, 2015&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[[image:fasad.png|300px]] &lt;br /&gt;
 &lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#00549E; color:white&amp;quot;|&amp;lt;h2&amp;gt;&amp;lt;span style=&amp;quot;color:white&amp;quot;&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/span&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers | TBD]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;TBD&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''TBD'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; TBD &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | Your Scripts in My Page - What Could Possibly Go Wrong?]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:45-15:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:15-16:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203751</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203751"/>
				<updated>2015-11-23T19:40:01Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
= Date =&lt;br /&gt;
Tuesday December 8th, 2015&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[[image:fasad.png|300px]] &lt;br /&gt;
 &lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#00549E; color:white&amp;quot;|&amp;lt;h2&amp;gt;&amp;lt;span style=&amp;quot;color:white&amp;quot;&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/span&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers | TBD]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;TBD&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''TBD'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; TBD &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:45-15:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:15-16:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203750</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203750"/>
				<updated>2015-11-23T19:34:13Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Bio */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Michele Orrú =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workshop ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203749</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203749"/>
				<updated>2015-11-23T19:33:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Bio */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
The closest Mario ever was to visiting 日本(Japan) was a wild ride between ESC$B and ESC(B so it's about time to pay a visit!)&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Michele Orrú =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Martin Johns is a research expert in the Security and Trust group within SAP SE, where he leads the Web application security team. Before joining SAP, Martin studied Mathematics and Computer Science at the Universities of Hamburg, Santa Cruz (CA), and Passau. During the 1990s and the early years of the new millennium he earned his living as a software engineer in German companies. He is board member of the German OWASP chapter, holds a Diploma in Computer Science from University of Hamburg and a Doctorate from the University of Passau. Martin is a regular speaker at international security conferences, incl. Black Hat, the OWASP AppSec series, ACSAC, ESORICS, PacSec, HackInTheBox, RSA Europe, or the CCC Congress.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workshop ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203748</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203748"/>
				<updated>2015-11-23T19:33:20Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Abstract */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
The closest Mario ever was to visiting 日本(Japan) was a wild ride between ESC$B and ESC(B so it's about time to pay a visit!)&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Michele Orrú =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
When it comes to web security, there is the one policy to rule them all: The Same-origin Policy. Thanks to this policy, sites hosted on disjunct origins are nice and cleanly separated, thus preventing the leakage of sensitive information into the hands of unauthorized parties. Unfortunately, HTML predates the Same-origin Policy and, thus, was not designed with the origin-based security model in mind. In consequence, HTML tags can freely reference cross-domain locations and include cross-domain content in their hosting web pages.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will present an attack, resulting from this circumstance, that has been widely overlooked in the past but affects a surprisingly high number of Web sites: Information leakage via cross-domain script inclusion.&lt;br /&gt;
&lt;br /&gt;
Modern web sites frequently generate JavaScript on-the-fly via server-side scripting, incorporating personalized user data in the process. Thanks to HTML's general ignorance of the Same-origin Policy, an attacker is able to include such dynamic scripts into web pages under his control using script-tags pointing to the vulnerable site. This, in turn, allows him to learn many of the secrets contained in these scripts, through the scripts interaction with the page it is included in. In our experiments, we were able to obtain personal information such as name &amp;amp; address of the logged-in user, leak CSRF tokens, read the users emails, and occasionally fully compromise the user's account. All possible by simply including a script-URL into one of our web pages.&lt;br /&gt;
&lt;br /&gt;
To systematically investigate the issue, we conducted a study on its prevalence in a set of 150 top-ranked domains, in which we observed that a third of the examined sites utilize dynamic JavaScript. Using our attack techniques, we able to leak sensitive data from more than 80% of these sites via remote script inclusion. In the talk we will present the study in general, and the most interesting cases in detail, showing the wide range of possible attack variations along with a bag of tricks how the including page can be prepared to efficiently leak a script's secrets. Furthermore, we present an efficient detection mechanism, in the form of a browser extension, as well as defensive measure, which enable robust protection.&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workshop ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203747</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203747"/>
				<updated>2015-11-23T19:32:12Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Jenny Radcliffe */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
The closest Mario ever was to visiting 日本(Japan) was a wild ride between ESC$B and ESC(B so it's about time to pay a visit!)&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Michele Orrú =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workshop ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203746</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203746"/>
				<updated>2015-11-23T19:31:22Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Title */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
The closest Mario ever was to visiting 日本(Japan) was a wild ride between ESC$B and ESC(B so it's about time to pay a visit!)&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Michele Orrú =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Jenny Radcliffe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Jenny Radcliffe  - aka “The People Hacker” - is a force to be reckoned with. She can diffuse a crisis situation, talk her way into a secure building and spot a psychopath at a hundred paces. She has been called a mind reader and a ‘human lie detector’, and likened to a Jedi Knight.&lt;br /&gt;
&lt;br /&gt;
In reality, she is an expert in Social Engineering (the human element of security), negotiations, non-verbal communication and deception, using her skills to help clients from corporations and law enforcement, to poker players, politicians and the security industry.&lt;br /&gt;
&lt;br /&gt;
Using a mixture of scams, psychological tactics, advanced profiling and non verbal communication skills, Jenny highlights how criminals, special interest groups  and others with mal-intent, can talk or trick their way into gaining access to  personnel, buildings and confidential information. It’s a guaranteed eye-opener for everyone from the Board to the Staff – many of whom will not appreciate how intrinsically linked their personal and family security is with that of their employer!&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
The Invisible Man -  Social Engineering Methods and Mindsets Revealed - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
This session covers some of the most widely used social engineering methods and tactics and explains how these are used to breach the physical and human elements of organisations.  &lt;br /&gt;
The workshop also covers the psychology behind Social Engineering attacks and explains how and why it works, revealing the hidden mindset of Social Engineers and the victims they target, illustrated by anecdotes and lessons learnt from successful real life attacks.&lt;br /&gt;
&lt;br /&gt;
Key Points&lt;br /&gt;
 - Understand the goals and motivations of Social Engineers&lt;br /&gt;
 - Understand some of the most common attack methods and tricks deployed &lt;br /&gt;
 - Revealing the dark psychology of Social Engineers. What makes a good Social Engineer?  Why are they successful? Who do they target? How and why choose one company or individual over another&lt;br /&gt;
 - Advice and guidance into protecting against Social Engineering attacks and creating awareness within our organisations and as individuals&lt;br /&gt;
 - Interactive exercises, quiz and case study with prizes &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Your Scripts in My Page - What Could Possibly Go Wrong?&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workshop ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203586</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203586"/>
				<updated>2015-11-19T16:30:11Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[[image:fasad.png|300px]] &lt;br /&gt;
 &lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#00549E; color:white&amp;quot;|&amp;lt;h2&amp;gt;&amp;lt;span style=&amp;quot;color:white&amp;quot;&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/span&amp;gt;&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Social Engineering Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#D85D33&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#E88A49&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; Time to practice your new skills &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#87BB40&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 14:45-15:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 15:15-16:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#727F5B&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#0079A7&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203583</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203583"/>
				<updated>2015-11-19T16:04:40Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Venue */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[[image:fasad.png|300px]] &lt;br /&gt;
 &lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Social Engineering Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; Time to practice your new skills &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:15-16:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Fasad.png&amp;diff=203582</id>
		<title>File:Fasad.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Fasad.png&amp;diff=203582"/>
				<updated>2015-11-19T16:03:04Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203581</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203581"/>
				<updated>2015-11-19T16:02:34Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Venue */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[[image:fasad.png]] &lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Social Engineering Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; Time to practice your new skills &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:15-16:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203580</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203580"/>
				<updated>2015-11-19T16:01:10Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Venue */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], Lindholmspiren 5, 417 56 Göteborg &amp;lt;br&amp;gt;&lt;br /&gt;
Here is the [http://www.chalmerskonferens.se/wp-content/uploads/Skiss-konf-avd-LCC.pdf layout] of the rooms. &amp;lt;br&amp;gt;&lt;br /&gt;
How to get [http://www.chalmerskonferens.se/en/kontakt/lindholmen/#find_us there].&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Social Engineering Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; Time to practice your new skills &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:15-16:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203557</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203557"/>
				<updated>2015-11-18T21:35:59Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | Room || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | Tesla &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | Kelvin&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | Newton&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Social Engineering Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; Time to practice your new skills &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | Room || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Lindholmen Conference Hall&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:15-16:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203556</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203556"/>
				<updated>2015-11-18T21:29:47Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''REGISTRATION OPENS'' &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-10:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''COFFEE (suggested time)''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-11:15 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; '''OWASP Security Shepherd Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Social Engineering Workshop, cont.'''  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''OWASP Security Shepherd Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; Time to practice your new skills &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''Forensics Workshop, cont.''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:15-16:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; ''BEER, MINGLE, FOOD AND SECURITY CHAT'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;br /&gt;
&lt;br /&gt;
= Policies =&lt;br /&gt;
Participants are required to abide by OWASP's [https://www.owasp.org/index.php/Governance/Conference_Policies#Anti_Harassment_Policy| Anti harassment policy]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conference_Policies#Cancellation_Policy| Refund/cancellation policy]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203259</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203259"/>
				<updated>2015-11-10T17:44:44Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Bio */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
The closest Mario ever was to visiting 日本(Japan) was a wild ride between ESC$B and ESC(B so it's about time to pay a visit!)&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Michele Orrú =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Jenny Radcliffe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Jenny Radcliffe  - aka “The People Hacker” - is a force to be reckoned with. She can diffuse a crisis situation, talk her way into a secure building and spot a psychopath at a hundred paces. She has been called a mind reader and a ‘human lie detector’, and likened to a Jedi Knight.&lt;br /&gt;
&lt;br /&gt;
In reality, she is an expert in Social Engineering (the human element of security), negotiations, non-verbal communication and deception, using her skills to help clients from corporations and law enforcement, to poker players, politicians and the security industry.&lt;br /&gt;
&lt;br /&gt;
Using a mixture of scams, psychological tactics, advanced profiling and non verbal communication skills, Jenny highlights how criminals, special interest groups  and others with mal-intent, can talk or trick their way into gaining access to  personnel, buildings and confidential information. It’s a guaranteed eye-opener for everyone from the Board to the Staff – many of whom will not appreciate how intrinsically linked their personal and family security is with that of their employer!&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
The Invisible Man -  Social Engineering Methods and Mindsets Revealed - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
This session covers some of the most widely used social engineering methods and tactics and explains how these are used to breach the physical and human elements of organisations.  &lt;br /&gt;
The workshop also covers the psychology behind Social Engineering attacks and explains how and why it works, revealing the hidden mindset of Social Engineers and the victims they target, illustrated by anecdotes and lessons learnt from successful real life attacks.&lt;br /&gt;
&lt;br /&gt;
Key Points&lt;br /&gt;
 - Understand the goals and motivations of Social Engineers&lt;br /&gt;
 - Understand some of the most common attack methods and tricks deployed &lt;br /&gt;
 - Revealing the dark psychology of Social Engineers. What makes a good Social Engineer?  Why are they successful? Who do they target? How and why choose one company or individual over another&lt;br /&gt;
 - Advice and guidance into protecting against Social Engineering attacks and creating awareness within our organisations and as individuals&lt;br /&gt;
 - Interactive exercises, quiz and case study with prizes &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Seán is currently working as an InfoSec Analyst and studying for a Masters in Security and Forensics. He is also the Mobile Dev Lead for the Security Shepherd Project. During college he started making vulnerable Android Apps for the OWASP Security Shepherd project, which he continues to this day. He is always looking for new ways to make vulnerable Mobile Apps. Speaker at AppSec EU 2014, Attendee at Project summit in AppSec EU 2015, Speaker at DaggerCon 2015.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workshop ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203181</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203181"/>
				<updated>2015-11-07T15:59:10Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Buy your ticket here:&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There are two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203180</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203180"/>
				<updated>2015-11-07T09:54:54Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There will be two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203179</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203179"/>
				<updated>2015-11-07T09:54:19Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There will be two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
''Note! There are still some parts of the budget to straighten out. If everything comes along according to plan we'll manage to keep the prices for standard tickets low, but we can't promise anything yet so make sure you grab your early bird ticket quickly!''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note! OWASP paying members are eligible for the standard OWASP discount; in return for sending your Membership Number to mattias.jidhage@owasp.org you will receive a personal discount code to be used when ordering your OWASP Gothenburg Day 2015 ticket. Your Membership Number can be found when logging into the OWASP portal.''&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203127</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203127"/>
				<updated>2015-11-05T20:00:43Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Venue */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
[http://www.chalmerskonferens.se/en/konferensevent/lindholmen-conference-centre/ Lindholmen Conference Center], December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There will be two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203126</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203126"/>
				<updated>2015-11-05T19:57:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There will be two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203125</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203125"/>
				<updated>2015-11-05T19:57:41Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
There will be two major ticket types;&lt;br /&gt;
* Full day ticket, where an early-bird ticket will set you back SEK 470&lt;br /&gt;
* Afternoon ticket, where an early-bird ticket will cost SEK 300&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Full day ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on all sessions during the entire day. Note that the workshops have limited number of seats.&lt;br /&gt;
The tickets also entitles you coffee in the morning and afternoon, lunch, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;Afternoon ticket &amp;lt;/h4&amp;gt;&lt;br /&gt;
Entitles you to participate on the afternoon presentations. The morning workshops are not included.&lt;br /&gt;
The tickets also entitles you coffee in the afternoon, a light dinner and something to drink with that.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203124</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203124"/>
				<updated>2015-11-05T19:48:55Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe&amp;lt;/h4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203123</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203123"/>
				<updated>2015-11-05T19:47:54Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Mario_Heiderich | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Mario Heiderich&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Martin Johns&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Marie Moe]]'''&amp;lt;/h4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orr.C3.BA | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h4&amp;gt;Michele Orrú&amp;lt;/h4&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203122</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203122"/>
				<updated>2015-11-05T19:45:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
The closest Mario ever was to visiting 日本(Japan) was a wild ride between ESC$B and ESC(B so it's about time to pay a visit!)&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Michele Orrú =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Jenny Radcliffe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Jenny Radcliffe  - aka “The People Hacker” - is a force to be reckoned with. She can diffuse a crisis situation, talk her way into a secure building and spot a psychopath at a hundred paces. She has been called a mind reader and a ‘human lie detector’, and likened to a Jedi Knight.&lt;br /&gt;
&lt;br /&gt;
In reality, she is an expert in Social Engineering (the human element of security), negotiations, non-verbal communication and deception, using her skills to help clients from corporations and law enforcement, to poker players, politicians and the security industry.&lt;br /&gt;
&lt;br /&gt;
Using a mixture of scams, psychological tactics, advanced profiling and non verbal communication skills, Jenny highlights how criminals, special interest groups  and others with mal-intent, can talk or trick their way into gaining access to  personnel, buildings and confidential information. It’s a guaranteed eye-opener for everyone from the Board to the Staff – many of whom will not appreciate how intrinsically linked their personal and family security is with that of their employer!&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
The Invisible Man -  Social Engineering Methods and Mindsets Revealed - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
This session covers some of the most widely used social engineering methods and tactics and explains how these are used to breach the physical and human elements of organisations.  &lt;br /&gt;
The workshop also covers the psychology behind Social Engineering attacks and explains how and why it works, revealing the hidden mindset of Social Engineers and the victims they target, illustrated by anecdotes and lessons learnt from successful real life attacks.&lt;br /&gt;
&lt;br /&gt;
Key Points&lt;br /&gt;
 - Understand the goals and motivations of Social Engineers&lt;br /&gt;
 - Understand some of the most common attack methods and tricks deployed &lt;br /&gt;
 - Revealing the dark psychology of Social Engineers. What makes a good Social Engineer?  Why are they successful? Who do they target? How and why choose one company or individual over another&lt;br /&gt;
 - Advice and guidance into protecting against Social Engineering attacks and creating awareness within our organisations and as individuals&lt;br /&gt;
 - Interactive exercises, quiz and case study with prizes &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 == Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Rikard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workshop ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203121</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203121"/>
				<updated>2015-11-05T19:45:19Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Sean_Duggan | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Rikard_Bodforss | An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework]]'''&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Mario Heiderich&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Martin_Johns | TBA]]'''&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Martin Johns&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Marie_Moe | Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Marie Moe]]'''&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Michele_Orru | Dark FairyTales from a Phisherman (Vol. III)]]'''&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Michele Orrú&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203120</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203120"/>
				<updated>2015-11-05T19:42:27Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers#Jenny_Radcliffe | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Mario Heiderich&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;TBA&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Martin Johns&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Marie Moe&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Dark FairyTales from a Phisherman (Vol. III)&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Michele Orrú&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203119</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203119"/>
				<updated>2015-11-05T19:39:41Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
The closest Mario ever was to visiting 日本(Japan) was a wild ride between ESC$B and ESC(B so it's about time to pay a visit!)&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Michele Orrú =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Marie Moe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Jenny Radcliffe =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Jenny Radcliffe  - aka “The People Hacker” - is a force to be reckoned with. She can diffuse a crisis situation, talk her way into a secure building and spot a psychopath at a hundred paces. She has been called a mind reader and a ‘human lie detector’, and likened to a Jedi Knight.&lt;br /&gt;
&lt;br /&gt;
In reality, she is an expert in Social Engineering (the human element of security), negotiations, non-verbal communication and deception, using her skills to help clients from corporations and law enforcement, to poker players, politicians and the security industry.&lt;br /&gt;
&lt;br /&gt;
Using a mixture of scams, psychological tactics, advanced profiling and non verbal communication skills, Jenny highlights how criminals, special interest groups  and others with mal-intent, can talk or trick their way into gaining access to  personnel, buildings and confidential information. It’s a guaranteed eye-opener for everyone from the Board to the Staff – many of whom will not appreciate how intrinsically linked their personal and family security is with that of their employer!&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
The Invisible Man -  Social Engineering Methods and Mindsets Revealed - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
This session covers some of the most widely used social engineering methods and tactics and explains how these are used to breach the physical and human elements of organisations.  &lt;br /&gt;
The workshop also covers the psychology behind Social Engineering attacks and explains how and why it works, revealing the hidden mindset of Social Engineers and the victims they target, illustrated by anecdotes and lessons learnt from successful real life attacks.&lt;br /&gt;
&lt;br /&gt;
Key Points&lt;br /&gt;
 - Understand the goals and motivations of Social Engineers&lt;br /&gt;
 - Understand some of the most common attack methods and tricks deployed &lt;br /&gt;
 - Revealing the dark psychology of Social Engineers. What makes a good Social Engineer?  Why are they successful? Who do they target? How and why choose one company or individual over another&lt;br /&gt;
 - Advice and guidance into protecting against Social Engineering attacks and creating awareness within our organisations and as individuals&lt;br /&gt;
 - Interactive exercises, quiz and case study with prizes &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sean Duggan =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 == Title ==&lt;br /&gt;
OWASP Security Shepherd - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==  &lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Martin Johns =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Title ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Richard Bodforss =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workshop ==&lt;br /&gt;
Forensics - Workshop&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203118</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203118"/>
				<updated>2015-11-05T19:35:00Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Mario Heiderich =&lt;br /&gt;
&lt;br /&gt;
== Bio ==&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
The closest Mario ever was to visiting 日本(Japan) was a wild ride between ESC$B and ESC(B so it's about time to pay a visit!)&lt;br /&gt;
&lt;br /&gt;
=== Title ===&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Michele Orru&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Marie Moe&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jenny Radcliffe&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
Jenny Radcliffe  - aka “The People Hacker” - is a force to be reckoned with. She can diffuse a crisis situation, talk her way into a secure building and spot a psychopath at a hundred paces. She has been called a mind reader and a ‘human lie detector’, and likened to a Jedi Knight.&lt;br /&gt;
&lt;br /&gt;
In reality, she is an expert in Social Engineering (the human element of security), negotiations, non-verbal communication and deception, using her skills to help clients from corporations and law enforcement, to poker players, politicians and the security industry.&lt;br /&gt;
&lt;br /&gt;
Using a mixture of scams, psychological tactics, advanced profiling and non verbal communication skills, Jenny highlights how criminals, special interest groups  and others with mal-intent, can talk or trick their way into gaining access to  personnel, buildings and confidential information. It’s a guaranteed eye-opener for everyone from the Board to the Staff – many of whom will not appreciate how intrinsically linked their personal and family security is with that of their employer!&lt;br /&gt;
&lt;br /&gt;
Workshop:&lt;br /&gt;
The Invisible Man -  Social Engineering Methods and Mindsets Revealed&lt;br /&gt;
&lt;br /&gt;
Topic:&lt;br /&gt;
This session covers some of the most widely used social engineering methods and tactics and explains how these are used to breach the physical and human elements of organisations.  &lt;br /&gt;
The workshop also covers the psychology behind Social Engineering attacks and explains how and why it works, revealing the hidden mindset of Social Engineers and the victims they target, illustrated by anecdotes and lessons learnt from successful real life attacks.&lt;br /&gt;
&lt;br /&gt;
Key Points&lt;br /&gt;
 - Understand the goals and motivations of Social Engineers&lt;br /&gt;
 - Understand some of the most common attack methods and tricks deployed &lt;br /&gt;
 - Revealing the dark psychology of Social Engineers. What makes a good Social Engineer?  Why are they successful? Who do they target? How and why choose one company or individual over another&lt;br /&gt;
 - Advice and guidance into protecting against Social Engineering attacks and creating awareness within our organisations and as individuals&lt;br /&gt;
 - Interactive exercises, quiz and case study with prizes &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sean Duggan&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Workshop:&lt;br /&gt;
OWASP Security Shepherd&lt;br /&gt;
&lt;br /&gt;
Topic:&lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Martin Johns&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Richard Bodforss&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Workshop:&lt;br /&gt;
Forensics&lt;br /&gt;
&lt;br /&gt;
Topic:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203117</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203117"/>
				<updated>2015-11-05T19:22:45Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers | Social Engineering Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers | Forensics Workshop]]''' &amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Mario Heiderich&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;TBA&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Martin Johns&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Marie Moe&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Dark FairyTales from a Phisherman (Vol. III)&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Michele Orrú&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203116</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203116"/>
				<updated>2015-11-05T19:22:07Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;'''[[OGD15_Speakers | OWASP Security Shepherd]]''' &amp;lt;/h3&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OGD15_Speakers | Social Engineering Workshop]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Jennifer Radcliffe&amp;lt;/h4&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[[OGD15_Speakers | Forensics Workshop]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Rikard Bodforss&amp;lt;/h4&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Mario Heiderich&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;TBA&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Martin Johns&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Marie Moe&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Dark FairyTales from a Phisherman (Vol. III)&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Michele Orrú&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203115</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203115"/>
				<updated>2015-11-05T19:20:35Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
'''[[OGD15_Speakers | OWASP Security Shepherd]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;Sean Duggan&amp;lt;/h4&amp;gt;, OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OGD15_Speakers | Social Engineering Workshop]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Jennifer Radcliffe&amp;lt;/h2&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[[OGD15_Speakers | Forensics Workshop]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Rikard Bodforss]''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Mario Heiderich&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;TBA&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Martin Johns&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Marie Moe&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Dark FairyTales from a Phisherman (Vol. III)&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Michele Orrú&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203114</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203114"/>
				<updated>2015-11-05T19:19:30Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
'''[[OGD15_Speakers | OWASP Security Shepherd]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Sean Duggan&amp;lt;/h2&amp;gt;, OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OGD15_Speakers | Social Engineering Workshop]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;Jennifer Radcliffe&amp;lt;/h2&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[[OGD15_Speakers | Forensics Workshop]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Rikard Bodforss]''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Mario Heiderich&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;TBA&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Martin Johns&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Marie Moe&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h3&amp;gt;Dark FairyTales from a Phisherman (Vol. III)&amp;lt;/h3&amp;gt;&amp;lt;h2&amp;gt;Michele Orrú&amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203113</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203113"/>
				<updated>2015-11-05T19:13:52Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
'''[[OGD15_Speakers | OWASP Security Shepherd]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Sean Duggan], OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OGD15_Speakers | Social Engineering Workshop]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Jennifer Radcliffe]''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[[OGD15_Speakers | Forensics Workshop]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Rikard Bodforss]''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Mario Heiderich&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&amp;lt;/h3&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Martin Johns&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;TBA&amp;lt;/h3&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Marie Moe&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Michele Orrú&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;Dark FairyTales from a Phisherman (Vol. III)&amp;lt;/h3&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203112</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203112"/>
				<updated>2015-11-05T19:12:08Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
'''[[OGD15_Speakers | OWASP Security Shepherd]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Sean Duggan], OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OGD15_Speakers | Social Engineering]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Jennifer Radcliffe]''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[[OGD15_Speakers | Forensics]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Rikard Bodforss]''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Mario Heiderich&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&amp;lt;/h3&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Martin Johns&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;TBA&amp;lt;/h3&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Marie Moe&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity. Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart's attack surface.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Michele Orrú&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;Dark FairyTales from a Phisherman (Vol. III)&amp;lt;/h3&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203111</id>
		<title>OGD15 Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OGD15_Speakers&amp;diff=203111"/>
				<updated>2015-11-05T19:10:23Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: Created page with &amp;quot;Mario Heiderich  Bio: Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
Dr. Mario Heiderich, handsome heart-breaker, bon-vivant and (as he loves to call himself) &amp;quot;security researcher&amp;quot; is from Berlin, likes everything between lesser- and greater-than.&lt;br /&gt;
&lt;br /&gt;
He leads the small yet exquisite pen-test company called Cure53 and pesters peaceful attendees on various 5th tier conferences with his hastily assembled PowerPoint-slides and a lot of FUD.&lt;br /&gt;
&lt;br /&gt;
The closest Mario ever was to visiting 日本(Japan) was a wild ride between ESC$B and ESC(B so it's about time to pay a visit!)&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Some voices claim that &amp;quot;Angular is what HTML would have been if it had been designed for building web applications&amp;quot;. While this statement may or may not be true, is certainly accounts as one of the bolder ones a JavaScript web framework can ever issue. And where boldness is glistening like a German Bratwurst sausage in the evening sun, a critical review from a grumpy old security person shouldn’t be too far away. This talk will have a stern, very stern look at AngularJS in particular and shed light on the security aspects of this ever-popular tool. Did the super-hero framework do everything right and follow its own super-heroic principles? Does AngularJS increase or rather decrease the attack surface of a web application? How does AngularJS play along with the Content Security Policy, and was it a good idea to combine this kind of security with futuristic feature creep? And what about AngularJS version 2.0? Beware that we won’t stop at glancing at the code itself, investigating security best practices, and verifying compatibility and other common things that contribute to robust security (or lack thereof). We will cross the moral border and see if the AngularJS team could notice rogue bug tickets. A pivotal question that everyone is wondering about is: Have they successfully kept evil minds like yours truly speaker here from introducing new security bugs into the code base? This talk is a reckoning with a modern JavaScript framework that promises a lot and keeps even more, not necessarily for the best for developers and users. We will conclude in deriving a general lesson learnt and hopefully agree that progress doesn't invariably mean an enhancement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Michele Orru&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
Michele Orru a.k.a. antisnatchor is the lead core developer and&lt;br /&gt;
smart-minds-recruiter for the BeEF project. Michele is also the&lt;br /&gt;
co-author of the &amp;quot;Browser Hacker's Handbook.&amp;quot; He has a deep knowledge&lt;br /&gt;
of programming in multiple languages and paradigms, and is excited to&lt;br /&gt;
apply this knowledge while reading and hacking code written by others.&lt;br /&gt;
Michele loves lateral thinking, black metal, and the communist utopia&lt;br /&gt;
(there is still hope!). He also enjoys speaking and drinking at a&lt;br /&gt;
multitude of hacking conferences, including CONFidence, DeepSec,&lt;br /&gt;
Hacktivity, SecurityByte, AthCon, HackPra AllStars, OWASP AppSec USA,&lt;br /&gt;
44Con, EUSecWest, Ruxcon, InsomniHack, PXE, BlackHat and more we just&lt;br /&gt;
cant disclose. Besides having a grim passion for hacking and&lt;br /&gt;
programming, he enjoys leaving his Mac alone, while fishing on&lt;br /&gt;
saltwater and praying for Kubricks resurrection.&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
Dark FairyTales from a Phisherman (Vol. III)&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Phishing and client-side exploitation DevOps for all&lt;br /&gt;
your needs. Combine BeEF, PhishingFrenzy and your fishy business to&lt;br /&gt;
automate most of the usual phishing workflow while minimizing human&lt;br /&gt;
interaction. Multiple real-life phishing engagements will be discussed,&lt;br /&gt;
together with the shiny new BeEF Autorun Rule Engine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Marie Moe&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
Marie Moe is passionate about incident handling and information sharing, she cares about public safety and securing systems that may impact human lives, this is why she has joined the grassroots organisation “I Am The Cavalry”. Marie is a research scientist at SINTEF ICT, and has a Ph. D. in information security. She has experience as a team leader at NorCERT, the Norwegian national CERT. Marie also teaches a class on incident management and contingency planning at Gjøvik University College in Norway. Marie loves to break crypto protocols, but gets angry when its in her own body.&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
Unpatchable - Living with a Vulnerable Implanted Device&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity.&lt;br /&gt;
&lt;br /&gt;
Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart’s attack surface.&lt;br /&gt;
&lt;br /&gt;
This talk will be focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jenny Radcliffe&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
Jenny Radcliffe  - aka “The People Hacker” - is a force to be reckoned with. She can diffuse a crisis situation, talk her way into a secure building and spot a psychopath at a hundred paces. She has been called a mind reader and a ‘human lie detector’, and likened to a Jedi Knight.&lt;br /&gt;
&lt;br /&gt;
In reality, she is an expert in Social Engineering (the human element of security), negotiations, non-verbal communication and deception, using her skills to help clients from corporations and law enforcement, to poker players, politicians and the security industry.&lt;br /&gt;
&lt;br /&gt;
Using a mixture of scams, psychological tactics, advanced profiling and non verbal communication skills, Jenny highlights how criminals, special interest groups  and others with mal-intent, can talk or trick their way into gaining access to  personnel, buildings and confidential information. It’s a guaranteed eye-opener for everyone from the Board to the Staff – many of whom will not appreciate how intrinsically linked their personal and family security is with that of their employer!&lt;br /&gt;
&lt;br /&gt;
Workshop:&lt;br /&gt;
The Invisible Man -  Social Engineering Methods and Mindsets Revealed&lt;br /&gt;
&lt;br /&gt;
Topic:&lt;br /&gt;
This session covers some of the most widely used social engineering methods and tactics and explains how these are used to breach the physical and human elements of organisations.  &lt;br /&gt;
The workshop also covers the psychology behind Social Engineering attacks and explains how and why it works, revealing the hidden mindset of Social Engineers and the victims they target, illustrated by anecdotes and lessons learnt from successful real life attacks.&lt;br /&gt;
&lt;br /&gt;
Key Points&lt;br /&gt;
 - Understand the goals and motivations of Social Engineers&lt;br /&gt;
 - Understand some of the most common attack methods and tricks deployed &lt;br /&gt;
 - Revealing the dark psychology of Social Engineers. What makes a good Social Engineer?  Why are they successful? Who do they target? How and why choose one company or individual over another&lt;br /&gt;
 - Advice and guidance into protecting against Social Engineering attacks and creating awareness within our organisations and as individuals&lt;br /&gt;
 - Interactive exercises, quiz and case study with prizes &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sean Duggan&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Workshop:&lt;br /&gt;
OWASP Security Shepherd&lt;br /&gt;
&lt;br /&gt;
Topic:&lt;br /&gt;
How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Martin Johns&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Richard Bodforss&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Workshop:&lt;br /&gt;
Forensics&lt;br /&gt;
&lt;br /&gt;
Topic:&lt;br /&gt;
&amp;lt;TBA&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203110</id>
		<title>OWASP Gothenburg Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Gothenburg_Day_2015&amp;diff=203110"/>
				<updated>2015-11-05T19:09:26Z</updated>
		
		<summary type="html">&lt;p&gt;Mjidhage: /* Agenda &amp;amp; Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Welcome to THE security event of 2015 in Gothenburg! A full day with high quality speakers and workshops dedicated to security. If you are a developer or a security practitioner in the Gothenburg area participating is more or less mandatory, for all others it's just a really well spent day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
Lindholmen Conference Center, December 8th 2015&lt;br /&gt;
&lt;br /&gt;
= Agenda &amp;amp; Speakers =&lt;br /&gt;
&lt;br /&gt;
The detailed schedule is not yet set, this is a preliminary agenda&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP Gothenburg Day 2015&amp;lt;/h2&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-09:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Registration &amp;lt;br&amp;gt; BREAKFAST - Provided by event sponsors @ Breakfast Sponsor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:30:-12:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
&lt;br /&gt;
'''[[OGD15_Speakers | OWASP Security Shepherd]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Sean Duggan], OWASP [https://www.owasp.org/index.php/OWASP_Security_Shepherd Security Shepherd] Project Leader''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;How do you know a web site is secure? How do you know your credentials are safe online? What makes a web site safe? Do you even know the questions to ask to help determine this? HTTPs is not the answer and trust is no longer a solution. The only way to be sure is to perform ethical hacking on the web application using a combination of manual and automated pentesting techniques. These skills are in high demand in the market place right now - but how can one get them? Well that's easy... if you take the right first step! &lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
Join Sean Duggan for a 3 hour hands on workshop that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the market today. Compete against other attendees to solve increasingly complex security puzzles derived from real world security threats. Workshop attendees will leave with a real familiarity of web and mobile security testing best practice, terminology, workflows, and commonly used tool kits. &lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
Bring an open mind and your laptop&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
'''[[OGD15_Speakers | Social Engineering]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Jennifer Radcliffe]''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
'''[[OGD15_Speakers | Forensics]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://authorurl.com Rikard Bodforss]''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''LUNCH - Provided by event sponsors @ LunchSponsor''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Mario Heiderich&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework&amp;lt;/h3&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Martin Johns&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;TBA&amp;lt;/h3&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:45-15:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | ''FIKA - Coffee break''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:15 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Marie Moe&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;Unpatchable - Living with a vulnerable implanted device&amp;lt;/h3&amp;gt;&lt;br /&gt;
My life depends on the functioning of a medical device, a pacemaker that generates each and every beat of my heart. This computer inside of me may fail due to hardware and software issues, due to misconfigurations or network-connectivity. Yes, you read that correctly. The pacemaker has a wireless interface for remote monitoring and I am forced to become a human part of the Internet-of-Things. As a seasoned security-professional I am worried about my heart's attack surface.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:15-17:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Michele Orrú&amp;lt;/h2&amp;gt;&amp;lt;h3&amp;gt;Dark FairyTales from a Phisherman (Vol. III)&amp;lt;/h3&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-21:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Beer, mingel, food and security talk&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H1&amp;gt;&amp;lt;span style=&amp;quot;color:gold&amp;quot;&amp;gt;Gold Sponsor&amp;lt;/span&amp;gt;&amp;lt;/H1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:atea_logo.png|link=http://www.atea.se/|600px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;&amp;lt;span style=&amp;quot;color:silver&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/span&amp;gt;&amp;lt;/H3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:op5_logo_3d_2703px.png|link=http://www.op5.com/|200px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:chalmers-logo.png|link=http://www.chalmers.se/|250px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;&amp;lt;span style=&amp;quot;color:skyblue&amp;quot;&amp;gt;Event sponsors&amp;lt;/span&amp;gt;&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;center&amp;quot; &amp;gt;&lt;br /&gt;
[[image:mullvad-circle.png|link=https://mullvad.net/|70px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[image:assured_logo.png|link=https://www.assured.se/|80px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Tickets will be available shortly. Announcement will be made through the normal channels; the owasp-sweden mailing list and the @owaspgbg twitter account.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://www.eventbrite.com/e/owasp-gothenburg-day-2015-tickets-19260398370|Register for OWASP Gothenburg Day 2015]]&lt;br /&gt;
&lt;br /&gt;
= Sponsorship =&lt;br /&gt;
&lt;br /&gt;
There is still one silver sponsor slot and one event sponsor slot open, please contact Mikael Falkvidd, mikael.falkvidd@mjo.se if your company is interested in getting your hands on one of those.&lt;br /&gt;
[[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Mjidhage</name></author>	</entry>

	</feed>