<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Oana+Cornea</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Oana+Cornea"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Oana_Cornea"/>
		<updated>2026-04-29T06:43:15Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bucharest&amp;diff=251653</id>
		<title>Bucharest</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bucharest&amp;diff=251653"/>
				<updated>2019-05-16T13:35:44Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: /* Welcome to the Bucharest chapter homepage! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=Welcome= &lt;br /&gt;
&lt;br /&gt;
== Welcome to the Bucharest chapter homepage! == &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Romania Click here to join our mailing list.]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-community Click here to join the global community mailing list.]&amp;lt;br&amp;gt;&lt;br /&gt;
Follow us on [https://twitter.com/OWASPRomania Twitter.] and [https://www.facebook.com/owaspromania Facebook.]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Logo-ro.jpg|right|150px|link=https://www.owasp.org/index.php/]]&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter meetings are free and open. We encourage open discussion on all aspects of application security. Everyone is welcome to join us at our chapter meetings, members and non-members.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Chapter leader is [mailto:vlad.cotenescu@owasp.org Vlad Cotenescu]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Anyone who wants to get involved and help will be warmly welcome.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;If you would like to give a presentation (make sure that you have read the [https://www.owasp.org/index.php/Speaker_Agreement speaker agreement]). &amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;In case you have any questions about the OWASP Bucharest Chapter, send an email to [mailto:vlad.cotenescu@owasp.org Vlad Cotenescu]&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.youtube.com/channel/UCsVFkvsVZguEWmDCIIJ9blA Youtube channel]&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Past chapter leaders&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
2013 - 2019 [mailto:oana.cornea@owasp.org Oana Cornea]&amp;lt;br/&amp;gt;&lt;br /&gt;
2011 - 2012 Claudiu Constantinescu&lt;br /&gt;
&lt;br /&gt;
=Upcoming events= &lt;br /&gt;
== OWASP Bucharest AppSec Conference 2019 ==&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2019&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #16: TBD , 2019 ==&lt;br /&gt;
 '''Location and host: '''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15'''  Introduction and OWASP news&lt;br /&gt;
 '''19:15 - 21:00 ''' &lt;br /&gt;
 '''Description:''' &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Past events &amp;amp; meetings= &lt;br /&gt;
== Chapter Meeting #15: 2nd of July, 2018 ==&lt;br /&gt;
 '''Location and host: B-dul Aviatorilor, nr. 8, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15'''  Introduction and OWASP news&lt;br /&gt;
 '''19:15 - 21:00 ''' '''Workshop: [https://www.owasp.org/images/b/b0/Webservice_and_Microservice_Security_7-2018.pdf Webservice Security] - Jim Manico'''&lt;br /&gt;
 '''Description:''' Webservices are build upon the foundation of the same technology that is used to build web applications. Therefore, many of the standard web security defenses will apply when building webservices. However, stateless and other specialized webservice patterns make defending webservices different that normal web security in some regards. This module will review the various specialized attacks and defenses that developers need to be aware of when building secure webservices.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #14: 1st of February , 2018 == &lt;br /&gt;
 '''Location and host: B-dul Timisoara, nr. 15, AFI Park 4, etaj 4, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15 Introduction and OWASP news'''&lt;br /&gt;
 '''19:15 - 20:00''' '''Presentation: Handling of Security Requirements in Software Development Lifecycle - [https://de.linkedin.com/in/kefer/de Daniel Kefer]''' &amp;lt;b&amp;gt;&lt;br /&gt;
 '''20:00 - 20:45''' '''Presentation: [https://www.owasp.org/images/4/4e/OWASP-Ionut-Popescu-Less-Known-Web-Application-Vulnerabilities-Stripped.pdf Less Known Web Application Vulnerabilities - part 2] - [https://ro.linkedin.com/in/nytro Ionut Popescu]''' &lt;br /&gt;
 '''20:45 - 21:30''' Networking&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2017 OWASP Bucharest AppSec Conference 2017, 11th - 13th of October 2017] ==&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2016 OWASP AppSec Bucharest 6th of October, 2016] ==&lt;br /&gt;
== Chapter Meeting #13: 27th of April , 2016 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, etaj 5, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15 Introduction and OWASP news'''&lt;br /&gt;
 '''19:15 - 20:00''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/e/e7/OWASP_-_Ionut_Popescu.pptx PHP Object Injection]&amp;lt;/b&amp;gt; - [https://ro.linkedin.com/in/nytro Ionut Popescu]&lt;br /&gt;
 '''20:00 - 20:15''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/3/3a/Ksd.pdf Keystroke dynamics (2FA in web apps)]&amp;lt;/b&amp;gt; - [https://www.linkedin.com/in/cristian-grigoriu-93707b94 Cristian Grigoriu]&lt;br /&gt;
 '''20:15 - 20:30''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/0/03/OWASP_RansomwareHoneypots.pptx Early Detection: Using honeypots to spot ransomware infections]&amp;lt;/b&amp;gt; - [https://www.linkedin.com/in/aarongoldstein Aaron Goldstein]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check out OWASP presentations at Agile Talks http://www.meetup.com/The-Bucharest-Agile-Software-Meetup-Group/events/226301564/ &amp;lt;br&amp;gt;&lt;br /&gt;
Tech Hub - 39-41 Nicolae Filipescu, Bucharest&lt;br /&gt;
== Eastern European Event: 9th of October, 2015 ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_EEE_Bucharest_Event_2015 Local event page]&amp;lt;br/&amp;gt;&lt;br /&gt;
Follow us on [https://twitter.com/owasp_eee Twitter.] [[Image:Bug.jpg|60px]] &amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #12: 18th of June, 2015 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, Dell, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 19:00 - 20:00 Presentation: [https://www.linkedin.com/in/johnnywachter Johnny Wachter] - '''Dynamic Malware Analysis'''– A hands on guide for quickly studying malware behavior and implementing mitigating controls:&lt;br /&gt;
 * This will demonstrate the manual analysis of malicious samples commonly distributed via Phishing Emails and Exploit Kits.&lt;br /&gt;
 * Common Tools and Techniques for Safely and Efficiently identifying Indicators of Compromise will be covered.&lt;br /&gt;
 * A practical guide and hands-on labs will be made available in case attendees wish to “practice” at home.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #11: 20th of November, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, Dell, Bucureşti, România'''          &lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Presentation: Aaron Goldstein - Search Engine Dorking[https://www.owasp.org/images/4/4a/OWASP_Dorking.pdf]&lt;br /&gt;
 20:00 - 21:00 Presentation: Johnny Wachter - Python and Incident Response [https://www.owasp.org/images/1/1e/Python_and_Incident_Response.pdf] &lt;br /&gt;
&lt;br /&gt;
== OWASP Romania InfoSec Conference 2014: 24th of October, 2014 ==&lt;br /&gt;
[https://www.owasp.org/index.php/OwaspRomaniaConference2014 OWASP Romania InfoSec Conference 2014 page]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #10: 7th of August, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Hanul Berarilor, Str. Poenaru Bordea, nr. 2, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' Owasp updates &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #9: June 12, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: BOC Tower, 3rd George Constantinescu St., entrance C, 4th floor, Bucureşti, România''' [https://maps.google.com/maps?t=m&amp;amp;ll=44.47907780000001%2C26.115150400000005&amp;amp;q=Intel+Software+Development&amp;amp;spn=0.0036512685548508207%2C0.0068231558434524815&amp;amp;output=classic]&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:15 - 20:00 Presentation: Jack Mannino - Building Secure Android Apps &lt;br /&gt;
 20:00 - 21:00 Presentation: Cosmin Huruiala - Risk scoring for penetration testing &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #8: April 9, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: [http://goo.gl/maps/Sofgh &amp;quot;Politehnica&amp;quot; University], Room EG306, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:15 - 20:00 Presentation: Simon Bennetts - &amp;quot;An introduction to OWASP ZAP&amp;quot;[https://www.owasp.org/index.php/User:Simon_Bennetts][https://www.owasp.org/images/9/96/OWASP_2014_OWASP_ROMANIA.pdf]&lt;br /&gt;
 20:00 - 21:00 Presentation: Ionut Popescu - &amp;quot;Introduction to shellcode development&amp;quot; [https://www.owasp.org/images/4/4c/Introduction_to_shellcode_development.pdf] &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #7: March 6, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Nicolae Titulescu 4-8, America House, East Entrance (near Starbucks), 6th floor, Bucureşti, România&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:25 - 20:45 Presentation: Dinis Cruz[https://www.owasp.org/index.php/User:Dinis.cruz] - &amp;quot;REST Security and Exploitation&amp;quot;&lt;br /&gt;
                http://blog.diniscruz.com/search/label/XmlDecoder&lt;br /&gt;
                http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html &lt;br /&gt;
== Chapter Meeting #6: Jan 23, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: BOC Tower, 3rd George Constantinescu St., entrance C, 4th floor, Bucureşti, România''' [https://maps.google.com/maps?t=m&amp;amp;ll=44.47907780000001%2C26.115150400000005&amp;amp;q=Intel+Software+Development&amp;amp;spn=0.0036512685548508207%2C0.0068231558434524815&amp;amp;output=classic]&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:25 - 20:00 Presentation: &amp;quot;Port knocking&amp;quot;, Dan Vasile&lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Ecryptfs Tools for Android&amp;quot;[https://github.com/catalinionita/Ecryptfs-Tools-for-Android/commits/master], Catalin Ionita&lt;br /&gt;
== Chapter Meeting #5: Nov 21, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Nicolae Titulescu 4-8, America House, East Entrance (near Starbucks), 2nd floor, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Owasp updates &lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Introduction to fuzzing&amp;quot;, Costel Maxim&lt;br /&gt;
== OWASP Romania InfoSec Conference 2013, October 25 ==&lt;br /&gt;
&lt;br /&gt;
 '''When: October 25, 2013&amp;lt;br&amp;gt;Where: [http://goo.gl/maps/Sofgh &amp;quot;Politehnica&amp;quot; University, Bucureşti, România]&amp;lt;br&amp;gt;Event page: [https://www.owasp.org/index.php/OwaspRomaniaConference OWASP Romania InfoSec Conference 2013]&amp;lt;br&amp;gt;Participation to this event is free but you need to [https://owasp-romaniachapter-infosec.eventbrite.com/ register] (limited number of seats)'''&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #4: Aug 22, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: SemaParc RiverView Building, 6th floor, Str. Splaiul Independentei, nr. 309, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Owasp updates and projects&lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Application Security Introduction&amp;quot;, Cristian Pascariu&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #3: Jun 5, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: &amp;quot;Politehnica&amp;quot; University, Bucureşti, România'''&lt;br /&gt;
 '''Time: 14:30'''&lt;br /&gt;
Owasp EU Tour 2013 [https://www.owasp.org/index.php/EUTour2013_Bucharest_Agenda]&amp;lt;br&amp;gt;&lt;br /&gt;
Here are the presentations:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
'''Introduction to Owasp''' - Ionel Chirita [https://www.owasp.org/images/9/9d/OWASP_EU_Tour_2013_Bucharest_Ionel_Chirita.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Investing in security''' - Claudiu Constantinescu [https://www.owasp.org/images/6/6c/OWASP_EU_Tour_2013_Bucharest_Claudiu_Constantinescu.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Penetration testing - a way of improving our cyber security''' - Adrian Furtuna [https://www.owasp.org/images/9/93/OWASP_EU_Tour_2013_Bucharest_AdrianFurtuna.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Android reverse engineering: understanding third-party applications''' - Vicente Aguilera Diaz [https://www.owasp.org/images/a/a6/OWASP_EU_Tour_2013_Bucharest_Vicente_Aguilera_Diaz.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''The Trouble with Passwords''' - Mark Goodwin [http://people.mozilla.com/~mgoodwin/presentations/20130410/shells/embedder.html#http://people.mozilla.com/~mgoodwin/presentations/20130410/template.html]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Hacking the ViewState in ASP.NET''' - Ovidiu Diaconescu[https://www.owasp.org/images/d/d3/OWASP_EU_Tour_2013_Bucharest_OvidiuDiaconescu.pdf] &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Do you &amp;quot;GRANT ALL PRIVILEGES ...&amp;quot; in MySQL/MariaDB/Percona Server? '''- Gabriel Preda[https://www.owasp.org/images/2/2c/OWASP_EU_Tour_2013_Bucharest_Gabriel_Preda.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
'''Some photos [https://www.owasp.org/index.php/File:OwaspEUTour_RomaniaChapterMeeting2013Photos.zip]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #2: Feb 28, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Hanul Berarilor, Str. Poenaru Bordea, nr. 2, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:30 Member expectations, future meetings, OWASP projects, technical topics&lt;br /&gt;
&lt;br /&gt;
Feb 10, 2013 Oana Cornea published iOS Application Security Testing Cheat Sheet [https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet]&lt;br /&gt;
&lt;br /&gt;
May 26, 2011 OWASP Top 10 Web Application Security Risks at RONUA [http://ronua.ro/CS/groups/ronua-bucuresti/default.aspx]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Chapter Meeting #1: May 27, 2011 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Muzeul Literaturii Române, Bd. Dacia 12, Sector 1, Bucureşti, România [http://www.mlr.ro]'''&lt;br /&gt;
 '''Time: 17:00'''&lt;br /&gt;
 17:00 - 17:15 Admission&lt;br /&gt;
 17:15 - 17:30 Brief introduction to OWASP, Claudiu Constantinescu&lt;br /&gt;
 17:30 - 18:00 Open discussion regarding OWASP Romania; what is expected or wished&lt;br /&gt;
 18:00 - 18:15 Web Application Security Testing - comparison of 6 web application vulnerability scanners - Cristian&lt;br /&gt;
 18:15 - 19:00 Other presentations and discussions&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponshorship= &lt;br /&gt;
Become a supporter of OWASP or of OWASP's Bucharest Chapter and help us to make application security visible.&amp;lt;br&amp;gt; All information about becoming a member/sponsor can be found [https://www.owasp.org/index.php/Membership here.]&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/index.php/Local_Chapter_Supporter&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chapter Supporters==&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bucharest&amp;diff=251652</id>
		<title>Bucharest</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bucharest&amp;diff=251652"/>
				<updated>2019-05-16T13:34:31Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit6&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=Welcome= &lt;br /&gt;
&lt;br /&gt;
== Welcome to the Bucharest chapter homepage! == &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Romania Click here to join our mailing list.]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-community Click here to join the global community mailing list.]&amp;lt;br&amp;gt;&lt;br /&gt;
Follow us on [https://twitter.com/OWASPRomania Twitter.] and [https://www.facebook.com/owaspromania Facebook.]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Logo-ro.jpg|right|150px|link=https://www.owasp.org/index.php/]]&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter meetings are free and open. We encourage open discussion on all aspects of application security. Everyone is welcome to join us at our chapter meetings, members and non-members.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Chapter leader is [mailto:vlad.cotenescu@owasp.org Vlad Cotenescu]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Anyone who wants to get involved and help will be warmly welcome.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;If you would like to give a presentation (make sure that you have read the [https://www.owasp.org/index.php/Speaker_Agreement speaker agreement]). &amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;In case you have any questions about the OWASP Bucharest Chapter, send an email to [mailto:vlad.cotenescu@owasp.org Vlad Cotenescu]&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.youtube.com/channel/UCsVFkvsVZguEWmDCIIJ9blA Youtube channel]&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Past chapter leaders&amp;lt;b&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;2013 - 2019 [mailto:oana.cornea@owasp.org Oana Cornea]&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;2011 - 2012 Claudiu Constantinescu&amp;lt;li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Upcoming events= &lt;br /&gt;
== OWASP Bucharest AppSec Conference 2019 ==&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2019&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #16: TBD , 2019 ==&lt;br /&gt;
 '''Location and host: '''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15'''  Introduction and OWASP news&lt;br /&gt;
 '''19:15 - 21:00 ''' &lt;br /&gt;
 '''Description:''' &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Past events &amp;amp; meetings= &lt;br /&gt;
== Chapter Meeting #15: 2nd of July, 2018 ==&lt;br /&gt;
 '''Location and host: B-dul Aviatorilor, nr. 8, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15'''  Introduction and OWASP news&lt;br /&gt;
 '''19:15 - 21:00 ''' '''Workshop: [https://www.owasp.org/images/b/b0/Webservice_and_Microservice_Security_7-2018.pdf Webservice Security] - Jim Manico'''&lt;br /&gt;
 '''Description:''' Webservices are build upon the foundation of the same technology that is used to build web applications. Therefore, many of the standard web security defenses will apply when building webservices. However, stateless and other specialized webservice patterns make defending webservices different that normal web security in some regards. This module will review the various specialized attacks and defenses that developers need to be aware of when building secure webservices.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #14: 1st of February , 2018 == &lt;br /&gt;
 '''Location and host: B-dul Timisoara, nr. 15, AFI Park 4, etaj 4, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15 Introduction and OWASP news'''&lt;br /&gt;
 '''19:15 - 20:00''' '''Presentation: Handling of Security Requirements in Software Development Lifecycle - [https://de.linkedin.com/in/kefer/de Daniel Kefer]''' &amp;lt;b&amp;gt;&lt;br /&gt;
 '''20:00 - 20:45''' '''Presentation: [https://www.owasp.org/images/4/4e/OWASP-Ionut-Popescu-Less-Known-Web-Application-Vulnerabilities-Stripped.pdf Less Known Web Application Vulnerabilities - part 2] - [https://ro.linkedin.com/in/nytro Ionut Popescu]''' &lt;br /&gt;
 '''20:45 - 21:30''' Networking&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2017 OWASP Bucharest AppSec Conference 2017, 11th - 13th of October 2017] ==&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2016 OWASP AppSec Bucharest 6th of October, 2016] ==&lt;br /&gt;
== Chapter Meeting #13: 27th of April , 2016 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, etaj 5, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15 Introduction and OWASP news'''&lt;br /&gt;
 '''19:15 - 20:00''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/e/e7/OWASP_-_Ionut_Popescu.pptx PHP Object Injection]&amp;lt;/b&amp;gt; - [https://ro.linkedin.com/in/nytro Ionut Popescu]&lt;br /&gt;
 '''20:00 - 20:15''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/3/3a/Ksd.pdf Keystroke dynamics (2FA in web apps)]&amp;lt;/b&amp;gt; - [https://www.linkedin.com/in/cristian-grigoriu-93707b94 Cristian Grigoriu]&lt;br /&gt;
 '''20:15 - 20:30''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/0/03/OWASP_RansomwareHoneypots.pptx Early Detection: Using honeypots to spot ransomware infections]&amp;lt;/b&amp;gt; - [https://www.linkedin.com/in/aarongoldstein Aaron Goldstein]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check out OWASP presentations at Agile Talks http://www.meetup.com/The-Bucharest-Agile-Software-Meetup-Group/events/226301564/ &amp;lt;br&amp;gt;&lt;br /&gt;
Tech Hub - 39-41 Nicolae Filipescu, Bucharest&lt;br /&gt;
== Eastern European Event: 9th of October, 2015 ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_EEE_Bucharest_Event_2015 Local event page]&amp;lt;br/&amp;gt;&lt;br /&gt;
Follow us on [https://twitter.com/owasp_eee Twitter.] [[Image:Bug.jpg|60px]] &amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #12: 18th of June, 2015 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, Dell, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 19:00 - 20:00 Presentation: [https://www.linkedin.com/in/johnnywachter Johnny Wachter] - '''Dynamic Malware Analysis'''– A hands on guide for quickly studying malware behavior and implementing mitigating controls:&lt;br /&gt;
 * This will demonstrate the manual analysis of malicious samples commonly distributed via Phishing Emails and Exploit Kits.&lt;br /&gt;
 * Common Tools and Techniques for Safely and Efficiently identifying Indicators of Compromise will be covered.&lt;br /&gt;
 * A practical guide and hands-on labs will be made available in case attendees wish to “practice” at home.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #11: 20th of November, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, Dell, Bucureşti, România'''          &lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Presentation: Aaron Goldstein - Search Engine Dorking[https://www.owasp.org/images/4/4a/OWASP_Dorking.pdf]&lt;br /&gt;
 20:00 - 21:00 Presentation: Johnny Wachter - Python and Incident Response [https://www.owasp.org/images/1/1e/Python_and_Incident_Response.pdf] &lt;br /&gt;
&lt;br /&gt;
== OWASP Romania InfoSec Conference 2014: 24th of October, 2014 ==&lt;br /&gt;
[https://www.owasp.org/index.php/OwaspRomaniaConference2014 OWASP Romania InfoSec Conference 2014 page]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #10: 7th of August, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Hanul Berarilor, Str. Poenaru Bordea, nr. 2, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' Owasp updates &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #9: June 12, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: BOC Tower, 3rd George Constantinescu St., entrance C, 4th floor, Bucureşti, România''' [https://maps.google.com/maps?t=m&amp;amp;ll=44.47907780000001%2C26.115150400000005&amp;amp;q=Intel+Software+Development&amp;amp;spn=0.0036512685548508207%2C0.0068231558434524815&amp;amp;output=classic]&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:15 - 20:00 Presentation: Jack Mannino - Building Secure Android Apps &lt;br /&gt;
 20:00 - 21:00 Presentation: Cosmin Huruiala - Risk scoring for penetration testing &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #8: April 9, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: [http://goo.gl/maps/Sofgh &amp;quot;Politehnica&amp;quot; University], Room EG306, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:15 - 20:00 Presentation: Simon Bennetts - &amp;quot;An introduction to OWASP ZAP&amp;quot;[https://www.owasp.org/index.php/User:Simon_Bennetts][https://www.owasp.org/images/9/96/OWASP_2014_OWASP_ROMANIA.pdf]&lt;br /&gt;
 20:00 - 21:00 Presentation: Ionut Popescu - &amp;quot;Introduction to shellcode development&amp;quot; [https://www.owasp.org/images/4/4c/Introduction_to_shellcode_development.pdf] &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #7: March 6, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Nicolae Titulescu 4-8, America House, East Entrance (near Starbucks), 6th floor, Bucureşti, România&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:25 - 20:45 Presentation: Dinis Cruz[https://www.owasp.org/index.php/User:Dinis.cruz] - &amp;quot;REST Security and Exploitation&amp;quot;&lt;br /&gt;
                http://blog.diniscruz.com/search/label/XmlDecoder&lt;br /&gt;
                http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html &lt;br /&gt;
== Chapter Meeting #6: Jan 23, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: BOC Tower, 3rd George Constantinescu St., entrance C, 4th floor, Bucureşti, România''' [https://maps.google.com/maps?t=m&amp;amp;ll=44.47907780000001%2C26.115150400000005&amp;amp;q=Intel+Software+Development&amp;amp;spn=0.0036512685548508207%2C0.0068231558434524815&amp;amp;output=classic]&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:25 - 20:00 Presentation: &amp;quot;Port knocking&amp;quot;, Dan Vasile&lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Ecryptfs Tools for Android&amp;quot;[https://github.com/catalinionita/Ecryptfs-Tools-for-Android/commits/master], Catalin Ionita&lt;br /&gt;
== Chapter Meeting #5: Nov 21, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Nicolae Titulescu 4-8, America House, East Entrance (near Starbucks), 2nd floor, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Owasp updates &lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Introduction to fuzzing&amp;quot;, Costel Maxim&lt;br /&gt;
== OWASP Romania InfoSec Conference 2013, October 25 ==&lt;br /&gt;
&lt;br /&gt;
 '''When: October 25, 2013&amp;lt;br&amp;gt;Where: [http://goo.gl/maps/Sofgh &amp;quot;Politehnica&amp;quot; University, Bucureşti, România]&amp;lt;br&amp;gt;Event page: [https://www.owasp.org/index.php/OwaspRomaniaConference OWASP Romania InfoSec Conference 2013]&amp;lt;br&amp;gt;Participation to this event is free but you need to [https://owasp-romaniachapter-infosec.eventbrite.com/ register] (limited number of seats)'''&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #4: Aug 22, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: SemaParc RiverView Building, 6th floor, Str. Splaiul Independentei, nr. 309, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Owasp updates and projects&lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Application Security Introduction&amp;quot;, Cristian Pascariu&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #3: Jun 5, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: &amp;quot;Politehnica&amp;quot; University, Bucureşti, România'''&lt;br /&gt;
 '''Time: 14:30'''&lt;br /&gt;
Owasp EU Tour 2013 [https://www.owasp.org/index.php/EUTour2013_Bucharest_Agenda]&amp;lt;br&amp;gt;&lt;br /&gt;
Here are the presentations:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
'''Introduction to Owasp''' - Ionel Chirita [https://www.owasp.org/images/9/9d/OWASP_EU_Tour_2013_Bucharest_Ionel_Chirita.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Investing in security''' - Claudiu Constantinescu [https://www.owasp.org/images/6/6c/OWASP_EU_Tour_2013_Bucharest_Claudiu_Constantinescu.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Penetration testing - a way of improving our cyber security''' - Adrian Furtuna [https://www.owasp.org/images/9/93/OWASP_EU_Tour_2013_Bucharest_AdrianFurtuna.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Android reverse engineering: understanding third-party applications''' - Vicente Aguilera Diaz [https://www.owasp.org/images/a/a6/OWASP_EU_Tour_2013_Bucharest_Vicente_Aguilera_Diaz.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''The Trouble with Passwords''' - Mark Goodwin [http://people.mozilla.com/~mgoodwin/presentations/20130410/shells/embedder.html#http://people.mozilla.com/~mgoodwin/presentations/20130410/template.html]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Hacking the ViewState in ASP.NET''' - Ovidiu Diaconescu[https://www.owasp.org/images/d/d3/OWASP_EU_Tour_2013_Bucharest_OvidiuDiaconescu.pdf] &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Do you &amp;quot;GRANT ALL PRIVILEGES ...&amp;quot; in MySQL/MariaDB/Percona Server? '''- Gabriel Preda[https://www.owasp.org/images/2/2c/OWASP_EU_Tour_2013_Bucharest_Gabriel_Preda.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
'''Some photos [https://www.owasp.org/index.php/File:OwaspEUTour_RomaniaChapterMeeting2013Photos.zip]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #2: Feb 28, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Hanul Berarilor, Str. Poenaru Bordea, nr. 2, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:30 Member expectations, future meetings, OWASP projects, technical topics&lt;br /&gt;
&lt;br /&gt;
Feb 10, 2013 Oana Cornea published iOS Application Security Testing Cheat Sheet [https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet]&lt;br /&gt;
&lt;br /&gt;
May 26, 2011 OWASP Top 10 Web Application Security Risks at RONUA [http://ronua.ro/CS/groups/ronua-bucuresti/default.aspx]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Chapter Meeting #1: May 27, 2011 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Muzeul Literaturii Române, Bd. Dacia 12, Sector 1, Bucureşti, România [http://www.mlr.ro]'''&lt;br /&gt;
 '''Time: 17:00'''&lt;br /&gt;
 17:00 - 17:15 Admission&lt;br /&gt;
 17:15 - 17:30 Brief introduction to OWASP, Claudiu Constantinescu&lt;br /&gt;
 17:30 - 18:00 Open discussion regarding OWASP Romania; what is expected or wished&lt;br /&gt;
 18:00 - 18:15 Web Application Security Testing - comparison of 6 web application vulnerability scanners - Cristian&lt;br /&gt;
 18:15 - 19:00 Other presentations and discussions&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponshorship= &lt;br /&gt;
Become a supporter of OWASP or of OWASP's Bucharest Chapter and help us to make application security visible.&amp;lt;br&amp;gt; All information about becoming a member/sponsor can be found [https://www.owasp.org/index.php/Membership here.]&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/index.php/Local_Chapter_Supporter&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chapter Supporters==&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bucharest&amp;diff=251651</id>
		<title>Bucharest</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bucharest&amp;diff=251651"/>
				<updated>2019-05-16T13:20:54Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: /* Chapter Meeting #16: TBD , 2018 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=Welcome= &lt;br /&gt;
&lt;br /&gt;
== Welcome to the Bucharest chapter homepage! == &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Romania Click here to join our mailing list.]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-community Click here to join the global community mailing list.]&amp;lt;br&amp;gt;&lt;br /&gt;
Follow us on [https://twitter.com/OWASPRomania Twitter.] and [https://www.facebook.com/owaspromania Facebook.]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Logo-ro.jpg|right|150px|link=https://www.owasp.org/index.php/]]&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter meetings are free and open. We encourage open discussion on all aspects of application security. Everyone is welcome to join us at our chapter meetings, members and non-members.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Chapter leader is [mailto:vlad.cotenescu@owasp.org Vlad Cotenescu]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Anyone who wants to get involved and help will be warmly welcome.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;If you would like to give a presentation (make sure that you have read the [https://www.owasp.org/index.php/Speaker_Agreement speaker agreement]). &amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;In case you have any questions about the OWASP Bucharest Chapter, send an email to [mailto:vlad.cotenescu@owasp.org Vlad Cotenescu]&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.youtube.com/channel/UCsVFkvsVZguEWmDCIIJ9blA Youtube channel]&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Upcoming events= &lt;br /&gt;
== OWASP Bucharest AppSec Conference 2019 ==&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2019&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #16: TBD , 2019 ==&lt;br /&gt;
 '''Location and host: '''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15'''  Introduction and OWASP news&lt;br /&gt;
 '''19:15 - 21:00 ''' &lt;br /&gt;
 '''Description:''' &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Past events &amp;amp; meetings= &lt;br /&gt;
== Chapter Meeting #15: 2nd of July, 2018 ==&lt;br /&gt;
 '''Location and host: B-dul Aviatorilor, nr. 8, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15'''  Introduction and OWASP news&lt;br /&gt;
 '''19:15 - 21:00 ''' '''Workshop: [https://www.owasp.org/images/b/b0/Webservice_and_Microservice_Security_7-2018.pdf Webservice Security] - Jim Manico'''&lt;br /&gt;
 '''Description:''' Webservices are build upon the foundation of the same technology that is used to build web applications. Therefore, many of the standard web security defenses will apply when building webservices. However, stateless and other specialized webservice patterns make defending webservices different that normal web security in some regards. This module will review the various specialized attacks and defenses that developers need to be aware of when building secure webservices.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #14: 1st of February , 2018 == &lt;br /&gt;
 '''Location and host: B-dul Timisoara, nr. 15, AFI Park 4, etaj 4, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15 Introduction and OWASP news'''&lt;br /&gt;
 '''19:15 - 20:00''' '''Presentation: Handling of Security Requirements in Software Development Lifecycle - [https://de.linkedin.com/in/kefer/de Daniel Kefer]''' &amp;lt;b&amp;gt;&lt;br /&gt;
 '''20:00 - 20:45''' '''Presentation: [https://www.owasp.org/images/4/4e/OWASP-Ionut-Popescu-Less-Known-Web-Application-Vulnerabilities-Stripped.pdf Less Known Web Application Vulnerabilities - part 2] - [https://ro.linkedin.com/in/nytro Ionut Popescu]''' &lt;br /&gt;
 '''20:45 - 21:30''' Networking&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2017 OWASP Bucharest AppSec Conference 2017, 11th - 13th of October 2017] ==&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2016 OWASP AppSec Bucharest 6th of October, 2016] ==&lt;br /&gt;
== Chapter Meeting #13: 27th of April , 2016 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, etaj 5, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15 Introduction and OWASP news'''&lt;br /&gt;
 '''19:15 - 20:00''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/e/e7/OWASP_-_Ionut_Popescu.pptx PHP Object Injection]&amp;lt;/b&amp;gt; - [https://ro.linkedin.com/in/nytro Ionut Popescu]&lt;br /&gt;
 '''20:00 - 20:15''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/3/3a/Ksd.pdf Keystroke dynamics (2FA in web apps)]&amp;lt;/b&amp;gt; - [https://www.linkedin.com/in/cristian-grigoriu-93707b94 Cristian Grigoriu]&lt;br /&gt;
 '''20:15 - 20:30''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/0/03/OWASP_RansomwareHoneypots.pptx Early Detection: Using honeypots to spot ransomware infections]&amp;lt;/b&amp;gt; - [https://www.linkedin.com/in/aarongoldstein Aaron Goldstein]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check out OWASP presentations at Agile Talks http://www.meetup.com/The-Bucharest-Agile-Software-Meetup-Group/events/226301564/ &amp;lt;br&amp;gt;&lt;br /&gt;
Tech Hub - 39-41 Nicolae Filipescu, Bucharest&lt;br /&gt;
== Eastern European Event: 9th of October, 2015 ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_EEE_Bucharest_Event_2015 Local event page]&amp;lt;br/&amp;gt;&lt;br /&gt;
Follow us on [https://twitter.com/owasp_eee Twitter.] [[Image:Bug.jpg|60px]] &amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #12: 18th of June, 2015 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, Dell, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 19:00 - 20:00 Presentation: [https://www.linkedin.com/in/johnnywachter Johnny Wachter] - '''Dynamic Malware Analysis'''– A hands on guide for quickly studying malware behavior and implementing mitigating controls:&lt;br /&gt;
 * This will demonstrate the manual analysis of malicious samples commonly distributed via Phishing Emails and Exploit Kits.&lt;br /&gt;
 * Common Tools and Techniques for Safely and Efficiently identifying Indicators of Compromise will be covered.&lt;br /&gt;
 * A practical guide and hands-on labs will be made available in case attendees wish to “practice” at home.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #11: 20th of November, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, Dell, Bucureşti, România'''          &lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Presentation: Aaron Goldstein - Search Engine Dorking[https://www.owasp.org/images/4/4a/OWASP_Dorking.pdf]&lt;br /&gt;
 20:00 - 21:00 Presentation: Johnny Wachter - Python and Incident Response [https://www.owasp.org/images/1/1e/Python_and_Incident_Response.pdf] &lt;br /&gt;
&lt;br /&gt;
== OWASP Romania InfoSec Conference 2014: 24th of October, 2014 ==&lt;br /&gt;
[https://www.owasp.org/index.php/OwaspRomaniaConference2014 OWASP Romania InfoSec Conference 2014 page]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #10: 7th of August, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Hanul Berarilor, Str. Poenaru Bordea, nr. 2, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' Owasp updates &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #9: June 12, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: BOC Tower, 3rd George Constantinescu St., entrance C, 4th floor, Bucureşti, România''' [https://maps.google.com/maps?t=m&amp;amp;ll=44.47907780000001%2C26.115150400000005&amp;amp;q=Intel+Software+Development&amp;amp;spn=0.0036512685548508207%2C0.0068231558434524815&amp;amp;output=classic]&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:15 - 20:00 Presentation: Jack Mannino - Building Secure Android Apps &lt;br /&gt;
 20:00 - 21:00 Presentation: Cosmin Huruiala - Risk scoring for penetration testing &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #8: April 9, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: [http://goo.gl/maps/Sofgh &amp;quot;Politehnica&amp;quot; University], Room EG306, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:15 - 20:00 Presentation: Simon Bennetts - &amp;quot;An introduction to OWASP ZAP&amp;quot;[https://www.owasp.org/index.php/User:Simon_Bennetts][https://www.owasp.org/images/9/96/OWASP_2014_OWASP_ROMANIA.pdf]&lt;br /&gt;
 20:00 - 21:00 Presentation: Ionut Popescu - &amp;quot;Introduction to shellcode development&amp;quot; [https://www.owasp.org/images/4/4c/Introduction_to_shellcode_development.pdf] &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #7: March 6, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Nicolae Titulescu 4-8, America House, East Entrance (near Starbucks), 6th floor, Bucureşti, România&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:25 - 20:45 Presentation: Dinis Cruz[https://www.owasp.org/index.php/User:Dinis.cruz] - &amp;quot;REST Security and Exploitation&amp;quot;&lt;br /&gt;
                http://blog.diniscruz.com/search/label/XmlDecoder&lt;br /&gt;
                http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html &lt;br /&gt;
== Chapter Meeting #6: Jan 23, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: BOC Tower, 3rd George Constantinescu St., entrance C, 4th floor, Bucureşti, România''' [https://maps.google.com/maps?t=m&amp;amp;ll=44.47907780000001%2C26.115150400000005&amp;amp;q=Intel+Software+Development&amp;amp;spn=0.0036512685548508207%2C0.0068231558434524815&amp;amp;output=classic]&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:25 - 20:00 Presentation: &amp;quot;Port knocking&amp;quot;, Dan Vasile&lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Ecryptfs Tools for Android&amp;quot;[https://github.com/catalinionita/Ecryptfs-Tools-for-Android/commits/master], Catalin Ionita&lt;br /&gt;
== Chapter Meeting #5: Nov 21, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Nicolae Titulescu 4-8, America House, East Entrance (near Starbucks), 2nd floor, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Owasp updates &lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Introduction to fuzzing&amp;quot;, Costel Maxim&lt;br /&gt;
== OWASP Romania InfoSec Conference 2013, October 25 ==&lt;br /&gt;
&lt;br /&gt;
 '''When: October 25, 2013&amp;lt;br&amp;gt;Where: [http://goo.gl/maps/Sofgh &amp;quot;Politehnica&amp;quot; University, Bucureşti, România]&amp;lt;br&amp;gt;Event page: [https://www.owasp.org/index.php/OwaspRomaniaConference OWASP Romania InfoSec Conference 2013]&amp;lt;br&amp;gt;Participation to this event is free but you need to [https://owasp-romaniachapter-infosec.eventbrite.com/ register] (limited number of seats)'''&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #4: Aug 22, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: SemaParc RiverView Building, 6th floor, Str. Splaiul Independentei, nr. 309, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Owasp updates and projects&lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Application Security Introduction&amp;quot;, Cristian Pascariu&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #3: Jun 5, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: &amp;quot;Politehnica&amp;quot; University, Bucureşti, România'''&lt;br /&gt;
 '''Time: 14:30'''&lt;br /&gt;
Owasp EU Tour 2013 [https://www.owasp.org/index.php/EUTour2013_Bucharest_Agenda]&amp;lt;br&amp;gt;&lt;br /&gt;
Here are the presentations:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
'''Introduction to Owasp''' - Ionel Chirita [https://www.owasp.org/images/9/9d/OWASP_EU_Tour_2013_Bucharest_Ionel_Chirita.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Investing in security''' - Claudiu Constantinescu [https://www.owasp.org/images/6/6c/OWASP_EU_Tour_2013_Bucharest_Claudiu_Constantinescu.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Penetration testing - a way of improving our cyber security''' - Adrian Furtuna [https://www.owasp.org/images/9/93/OWASP_EU_Tour_2013_Bucharest_AdrianFurtuna.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Android reverse engineering: understanding third-party applications''' - Vicente Aguilera Diaz [https://www.owasp.org/images/a/a6/OWASP_EU_Tour_2013_Bucharest_Vicente_Aguilera_Diaz.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''The Trouble with Passwords''' - Mark Goodwin [http://people.mozilla.com/~mgoodwin/presentations/20130410/shells/embedder.html#http://people.mozilla.com/~mgoodwin/presentations/20130410/template.html]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Hacking the ViewState in ASP.NET''' - Ovidiu Diaconescu[https://www.owasp.org/images/d/d3/OWASP_EU_Tour_2013_Bucharest_OvidiuDiaconescu.pdf] &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Do you &amp;quot;GRANT ALL PRIVILEGES ...&amp;quot; in MySQL/MariaDB/Percona Server? '''- Gabriel Preda[https://www.owasp.org/images/2/2c/OWASP_EU_Tour_2013_Bucharest_Gabriel_Preda.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
'''Some photos [https://www.owasp.org/index.php/File:OwaspEUTour_RomaniaChapterMeeting2013Photos.zip]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #2: Feb 28, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Hanul Berarilor, Str. Poenaru Bordea, nr. 2, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:30 Member expectations, future meetings, OWASP projects, technical topics&lt;br /&gt;
&lt;br /&gt;
Feb 10, 2013 Oana Cornea published iOS Application Security Testing Cheat Sheet [https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet]&lt;br /&gt;
&lt;br /&gt;
May 26, 2011 OWASP Top 10 Web Application Security Risks at RONUA [http://ronua.ro/CS/groups/ronua-bucuresti/default.aspx]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Chapter Meeting #1: May 27, 2011 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Muzeul Literaturii Române, Bd. Dacia 12, Sector 1, Bucureşti, România [http://www.mlr.ro]'''&lt;br /&gt;
 '''Time: 17:00'''&lt;br /&gt;
 17:00 - 17:15 Admission&lt;br /&gt;
 17:15 - 17:30 Brief introduction to OWASP, Claudiu Constantinescu&lt;br /&gt;
 17:30 - 18:00 Open discussion regarding OWASP Romania; what is expected or wished&lt;br /&gt;
 18:00 - 18:15 Web Application Security Testing - comparison of 6 web application vulnerability scanners - Cristian&lt;br /&gt;
 18:15 - 19:00 Other presentations and discussions&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponshorship= &lt;br /&gt;
Become a supporter of OWASP or of OWASP's Bucharest Chapter and help us to make application security visible.&amp;lt;br&amp;gt; All information about becoming a member/sponsor can be found [https://www.owasp.org/index.php/Membership here.]&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/index.php/Local_Chapter_Supporter&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chapter Supporters==&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bucharest&amp;diff=251522</id>
		<title>Bucharest</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bucharest&amp;diff=251522"/>
				<updated>2019-05-14T16:25:27Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit6&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=Welcome= &lt;br /&gt;
&lt;br /&gt;
== Welcome to the Bucharest chapter homepage! == &lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/owasp-Romania Click here to join our mailing list.]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-community Click here to join the global community mailing list.]&amp;lt;br&amp;gt;&lt;br /&gt;
Follow us on [https://twitter.com/OWASPRomania Twitter.] and [https://www.facebook.com/owaspromania Facebook.]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Logo-ro.jpg|right|150px|link=https://www.owasp.org/index.php/]]&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter meetings are free and open. We encourage open discussion on all aspects of application security. Everyone is welcome to join us at our chapter meetings, members and non-members.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Chapter leaders are [mailto:vlad.cotenescu@gmail.com Vlad Cotenescu] and &lt;br /&gt;
[mailto:oana.cornea@owasp.org Oana Cornea]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Anyone who wants to get involved and help will be warmly welcome.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;If you would like to give a presentation (make sure that you have read the [https://www.owasp.org/index.php/Speaker_Agreement speaker agreement]). &amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;In case you have any questions about the OWASP Bucharest Chapter, send an email to [mailto:oana.cornea@owasp.org Oana Cornea]&amp;lt;/li&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.youtube.com/channel/UCsVFkvsVZguEWmDCIIJ9blA Youtube channel]&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Upcoming events= &lt;br /&gt;
== Chapter Meeting #16: TBD , 2018 ==&lt;br /&gt;
 '''Location and host: '''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15'''  Introduction and OWASP news&lt;br /&gt;
 '''19:15 - 21:00 ''' &lt;br /&gt;
 '''Description:''' &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Past events &amp;amp; meetings= &lt;br /&gt;
== Chapter Meeting #15: 2nd of July, 2018 ==&lt;br /&gt;
 '''Location and host: B-dul Aviatorilor, nr. 8, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15'''  Introduction and OWASP news&lt;br /&gt;
 '''19:15 - 21:00 ''' '''Workshop: [https://www.owasp.org/images/b/b0/Webservice_and_Microservice_Security_7-2018.pdf Webservice Security] - Jim Manico'''&lt;br /&gt;
 '''Description:''' Webservices are build upon the foundation of the same technology that is used to build web applications. Therefore, many of the standard web security defenses will apply when building webservices. However, stateless and other specialized webservice patterns make defending webservices different that normal web security in some regards. This module will review the various specialized attacks and defenses that developers need to be aware of when building secure webservices.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #14: 1st of February , 2018 == &lt;br /&gt;
 '''Location and host: B-dul Timisoara, nr. 15, AFI Park 4, etaj 4, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15 Introduction and OWASP news'''&lt;br /&gt;
 '''19:15 - 20:00''' '''Presentation: Handling of Security Requirements in Software Development Lifecycle - [https://de.linkedin.com/in/kefer/de Daniel Kefer]''' &amp;lt;b&amp;gt;&lt;br /&gt;
 '''20:00 - 20:45''' '''Presentation: [https://www.owasp.org/images/4/4e/OWASP-Ionut-Popescu-Less-Known-Web-Application-Vulnerabilities-Stripped.pdf Less Known Web Application Vulnerabilities - part 2] - [https://ro.linkedin.com/in/nytro Ionut Popescu]''' &lt;br /&gt;
 '''20:45 - 21:30''' Networking&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2017 OWASP Bucharest AppSec Conference 2017, 11th - 13th of October 2017] ==&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bucharest_AppSec_Conference_2016 OWASP AppSec Bucharest 6th of October, 2016] ==&lt;br /&gt;
== Chapter Meeting #13: 27th of April , 2016 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, etaj 5, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 '''19:00 - 19:15 Introduction and OWASP news'''&lt;br /&gt;
 '''19:15 - 20:00''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/e/e7/OWASP_-_Ionut_Popescu.pptx PHP Object Injection]&amp;lt;/b&amp;gt; - [https://ro.linkedin.com/in/nytro Ionut Popescu]&lt;br /&gt;
 '''20:00 - 20:15''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/3/3a/Ksd.pdf Keystroke dynamics (2FA in web apps)]&amp;lt;/b&amp;gt; - [https://www.linkedin.com/in/cristian-grigoriu-93707b94 Cristian Grigoriu]&lt;br /&gt;
 '''20:15 - 20:30''' Presentation: &amp;lt;b&amp;gt;[https://www.owasp.org/images/0/03/OWASP_RansomwareHoneypots.pptx Early Detection: Using honeypots to spot ransomware infections]&amp;lt;/b&amp;gt; - [https://www.linkedin.com/in/aarongoldstein Aaron Goldstein]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check out OWASP presentations at Agile Talks http://www.meetup.com/The-Bucharest-Agile-Software-Meetup-Group/events/226301564/ &amp;lt;br&amp;gt;&lt;br /&gt;
Tech Hub - 39-41 Nicolae Filipescu, Bucharest&lt;br /&gt;
== Eastern European Event: 9th of October, 2015 ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_EEE_Bucharest_Event_2015 Local event page]&amp;lt;br/&amp;gt;&lt;br /&gt;
Follow us on [https://twitter.com/owasp_eee Twitter.] [[Image:Bug.jpg|60px]] &amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #12: 18th of June, 2015 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, Dell, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' &lt;br /&gt;
 19:00 - 20:00 Presentation: [https://www.linkedin.com/in/johnnywachter Johnny Wachter] - '''Dynamic Malware Analysis'''– A hands on guide for quickly studying malware behavior and implementing mitigating controls:&lt;br /&gt;
 * This will demonstrate the manual analysis of malicious samples commonly distributed via Phishing Emails and Exploit Kits.&lt;br /&gt;
 * Common Tools and Techniques for Safely and Efficiently identifying Indicators of Compromise will be covered.&lt;br /&gt;
 * A practical guide and hands-on labs will be made available in case attendees wish to “practice” at home.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #11: 20th of November, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: B-dul Dimitrie Pompei, nr. 10A, Conect Business Park, Cladirea C3, Dell, Bucureşti, România'''          &lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Presentation: Aaron Goldstein - Search Engine Dorking[https://www.owasp.org/images/4/4a/OWASP_Dorking.pdf]&lt;br /&gt;
 20:00 - 21:00 Presentation: Johnny Wachter - Python and Incident Response [https://www.owasp.org/images/1/1e/Python_and_Incident_Response.pdf] &lt;br /&gt;
&lt;br /&gt;
== OWASP Romania InfoSec Conference 2014: 24th of October, 2014 ==&lt;br /&gt;
[https://www.owasp.org/index.php/OwaspRomaniaConference2014 OWASP Romania InfoSec Conference 2014 page]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #10: 7th of August, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Hanul Berarilor, Str. Poenaru Bordea, nr. 2, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00''' Owasp updates &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #9: June 12, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: BOC Tower, 3rd George Constantinescu St., entrance C, 4th floor, Bucureşti, România''' [https://maps.google.com/maps?t=m&amp;amp;ll=44.47907780000001%2C26.115150400000005&amp;amp;q=Intel+Software+Development&amp;amp;spn=0.0036512685548508207%2C0.0068231558434524815&amp;amp;output=classic]&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:15 - 20:00 Presentation: Jack Mannino - Building Secure Android Apps &lt;br /&gt;
 20:00 - 21:00 Presentation: Cosmin Huruiala - Risk scoring for penetration testing &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #8: April 9, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: [http://goo.gl/maps/Sofgh &amp;quot;Politehnica&amp;quot; University], Room EG306, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:15 - 20:00 Presentation: Simon Bennetts - &amp;quot;An introduction to OWASP ZAP&amp;quot;[https://www.owasp.org/index.php/User:Simon_Bennetts][https://www.owasp.org/images/9/96/OWASP_2014_OWASP_ROMANIA.pdf]&lt;br /&gt;
 20:00 - 21:00 Presentation: Ionut Popescu - &amp;quot;Introduction to shellcode development&amp;quot; [https://www.owasp.org/images/4/4c/Introduction_to_shellcode_development.pdf] &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #7: March 6, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Nicolae Titulescu 4-8, America House, East Entrance (near Starbucks), 6th floor, Bucureşti, România&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:25 - 20:45 Presentation: Dinis Cruz[https://www.owasp.org/index.php/User:Dinis.cruz] - &amp;quot;REST Security and Exploitation&amp;quot;&lt;br /&gt;
                http://blog.diniscruz.com/search/label/XmlDecoder&lt;br /&gt;
                http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html &lt;br /&gt;
== Chapter Meeting #6: Jan 23, 2014 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: BOC Tower, 3rd George Constantinescu St., entrance C, 4th floor, Bucureşti, România''' [https://maps.google.com/maps?t=m&amp;amp;ll=44.47907780000001%2C26.115150400000005&amp;amp;q=Intel+Software+Development&amp;amp;spn=0.0036512685548508207%2C0.0068231558434524815&amp;amp;output=classic]&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 19:15 Owasp updates &lt;br /&gt;
 19:25 - 20:00 Presentation: &amp;quot;Port knocking&amp;quot;, Dan Vasile&lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Ecryptfs Tools for Android&amp;quot;[https://github.com/catalinionita/Ecryptfs-Tools-for-Android/commits/master], Catalin Ionita&lt;br /&gt;
== Chapter Meeting #5: Nov 21, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Nicolae Titulescu 4-8, America House, East Entrance (near Starbucks), 2nd floor, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Owasp updates &lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Introduction to fuzzing&amp;quot;, Costel Maxim&lt;br /&gt;
== OWASP Romania InfoSec Conference 2013, October 25 ==&lt;br /&gt;
&lt;br /&gt;
 '''When: October 25, 2013&amp;lt;br&amp;gt;Where: [http://goo.gl/maps/Sofgh &amp;quot;Politehnica&amp;quot; University, Bucureşti, România]&amp;lt;br&amp;gt;Event page: [https://www.owasp.org/index.php/OwaspRomaniaConference OWASP Romania InfoSec Conference 2013]&amp;lt;br&amp;gt;Participation to this event is free but you need to [https://owasp-romaniachapter-infosec.eventbrite.com/ register] (limited number of seats)'''&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting #4: Aug 22, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: SemaParc RiverView Building, 6th floor, Str. Splaiul Independentei, nr. 309, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:00 Owasp updates and projects&lt;br /&gt;
 20:00 - 21:00 Presentation: &amp;quot;Application Security Introduction&amp;quot;, Cristian Pascariu&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #3: Jun 5, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: &amp;quot;Politehnica&amp;quot; University, Bucureşti, România'''&lt;br /&gt;
 '''Time: 14:30'''&lt;br /&gt;
Owasp EU Tour 2013 [https://www.owasp.org/index.php/EUTour2013_Bucharest_Agenda]&amp;lt;br&amp;gt;&lt;br /&gt;
Here are the presentations:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
'''Introduction to Owasp''' - Ionel Chirita [https://www.owasp.org/images/9/9d/OWASP_EU_Tour_2013_Bucharest_Ionel_Chirita.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Investing in security''' - Claudiu Constantinescu [https://www.owasp.org/images/6/6c/OWASP_EU_Tour_2013_Bucharest_Claudiu_Constantinescu.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Penetration testing - a way of improving our cyber security''' - Adrian Furtuna [https://www.owasp.org/images/9/93/OWASP_EU_Tour_2013_Bucharest_AdrianFurtuna.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Android reverse engineering: understanding third-party applications''' - Vicente Aguilera Diaz [https://www.owasp.org/images/a/a6/OWASP_EU_Tour_2013_Bucharest_Vicente_Aguilera_Diaz.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''The Trouble with Passwords''' - Mark Goodwin [http://people.mozilla.com/~mgoodwin/presentations/20130410/shells/embedder.html#http://people.mozilla.com/~mgoodwin/presentations/20130410/template.html]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Hacking the ViewState in ASP.NET''' - Ovidiu Diaconescu[https://www.owasp.org/images/d/d3/OWASP_EU_Tour_2013_Bucharest_OvidiuDiaconescu.pdf] &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Do you &amp;quot;GRANT ALL PRIVILEGES ...&amp;quot; in MySQL/MariaDB/Percona Server? '''- Gabriel Preda[https://www.owasp.org/images/2/2c/OWASP_EU_Tour_2013_Bucharest_Gabriel_Preda.pdf]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
'''Some photos [https://www.owasp.org/index.php/File:OwaspEUTour_RomaniaChapterMeeting2013Photos.zip]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
== Chapter Meeting #2: Feb 28, 2013 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Hanul Berarilor, Str. Poenaru Bordea, nr. 2, Bucureşti, România'''&lt;br /&gt;
 '''Time: 19:00'''&lt;br /&gt;
 19:00 - 20:30 Member expectations, future meetings, OWASP projects, technical topics&lt;br /&gt;
&lt;br /&gt;
Feb 10, 2013 Oana Cornea published iOS Application Security Testing Cheat Sheet [https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet]&lt;br /&gt;
&lt;br /&gt;
May 26, 2011 OWASP Top 10 Web Application Security Risks at RONUA [http://ronua.ro/CS/groups/ronua-bucuresti/default.aspx]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Chapter Meeting #1: May 27, 2011 ==&lt;br /&gt;
&lt;br /&gt;
 '''Location and host: Muzeul Literaturii Române, Bd. Dacia 12, Sector 1, Bucureşti, România [http://www.mlr.ro]'''&lt;br /&gt;
 '''Time: 17:00'''&lt;br /&gt;
 17:00 - 17:15 Admission&lt;br /&gt;
 17:15 - 17:30 Brief introduction to OWASP, Claudiu Constantinescu&lt;br /&gt;
 17:30 - 18:00 Open discussion regarding OWASP Romania; what is expected or wished&lt;br /&gt;
 18:00 - 18:15 Web Application Security Testing - comparison of 6 web application vulnerability scanners - Cristian&lt;br /&gt;
 18:15 - 19:00 Other presentations and discussions&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponshorship= &lt;br /&gt;
Become a supporter of OWASP or of OWASP's Bucharest Chapter and help us to make application security visible.&amp;lt;br&amp;gt; All information about becoming a member/sponsor can be found [https://www.owasp.org/index.php/Membership here.]&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.owasp.org/index.php/Local_Chapter_Supporter&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chapter Supporters==&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Romania]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Training2&amp;diff=250517</id>
		<title>OWASP Bucharest AppSec Conference 2019 Training2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Training2&amp;diff=250517"/>
				<updated>2019-04-23T17:27:05Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; |  '''Time''' &lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Title'''&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainers'''&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 2 days training &amp;lt;br&amp;gt; [TBD] October &amp;lt;br&amp;gt; daily: 9:00 - 17:00&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Description:'''  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Intended audience:''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''This course requires following pre-requisites:'''&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
'''Seats available:	'''20 (first-come, first served)&amp;lt;br&amp;gt;&lt;br /&gt;
'''Price: 650 Euro / person'''&amp;lt;br&amp;gt;&lt;br /&gt;
[ Register here]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Workshops&amp;diff=250516</id>
		<title>OWASP Bucharest AppSec Conference 2019 Workshops</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Workshops&amp;diff=250516"/>
				<updated>2019-04-23T17:25:31Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: Created page with &amp;quot;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot; | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Workshop &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Trainers'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Workshop &amp;lt;br&amp;gt; [TBD]October&amp;lt;br&amp;gt; '''3,5 hours:'''&amp;lt;br&amp;gt;begins at 09:00 &amp;lt;br&amp;gt;''' '''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description:''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Intended audience:''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Skill level:	''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Requirements:''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Seats available:	'''20 (first-come, first served)&amp;lt;br&amp;gt;&lt;br /&gt;
'''Price:	'''free &amp;lt;br&amp;gt;&lt;br /&gt;
[Register here]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Workshop &amp;lt;br&amp;gt; [TBD] October&amp;lt;br&amp;gt; '''3 hours:'''&amp;lt;br&amp;gt;begins at 13:30 &amp;lt;br&amp;gt;''' '''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description:''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Intended audience:'''  &amp;lt;br&amp;gt;&lt;br /&gt;
'''Skill level:''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Requirements:'''  &amp;lt;br&amp;gt;&lt;br /&gt;
'''Seats available:''' 20 (first-come, first served)&amp;lt;br&amp;gt;&lt;br /&gt;
'''Price:	'''free &amp;lt;br&amp;gt;&lt;br /&gt;
[Register here]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_WiA&amp;diff=250515</id>
		<title>OWASP Bucharest AppSec Conference 2019 WiA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_WiA&amp;diff=250515"/>
				<updated>2019-04-23T17:23:56Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:WiA_400x400.jpg | 100px ]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_CTF&amp;diff=250514</id>
		<title>OWASP Bucharest AppSec Conference 2019 CTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_CTF&amp;diff=250514"/>
				<updated>2019-04-23T17:23:16Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: Created page with &amp;quot;CTF (Capture The Flag) contests are popular ways to hone your practical security skills by solving challenges on topics such as web, crypto, reverse, exploiting. &amp;lt;br&amp;gt;  We invi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CTF (Capture The Flag) contests are popular ways to hone your practical security skills by solving challenges on topics such as web, crypto, reverse, exploiting. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We invite all students passionate about practical security at the OWASP AppSec 2019 CTF! You and your team will solve challenges on web, reverse and exploiting. Challenges will be Linux-centric and web. &amp;lt;br&amp;gt;&lt;br /&gt;
Please note that this is a competition designed for students. &amp;lt;br&amp;gt;&lt;br /&gt;
Here are the important dates:&lt;br /&gt;
* The qualifiers are online on [TBD] September, between 10:00 and 22:00 (Bucharest time, UTC+2). In order to participate please  [REGISTER HERE!]&lt;br /&gt;
* The first 10 teams will be invited to the final.&lt;br /&gt;
* The final will be on [TBD] October. The qualified teams that want to compete for the prizes must be on site, in the competition room. &lt;br /&gt;
&lt;br /&gt;
The CTF final will take place during the OWASP Bucharest AppSec 2018 conference, on site, for 8 hours, from 9am to 5pm. Teams will consist of at most 5 players; everyone has to be on site at the conference. &amp;lt;br&amp;gt;&lt;br /&gt;
The CTF webpage is [https://owasp-ctf.security.cs.pub.ro/home here]&lt;br /&gt;
&lt;br /&gt;
We would not cover any transport or accommodation costs for the final competitors, in order to attend the event on '''[TBD]October'''.&amp;lt;br&amp;gt;&lt;br /&gt;
Hope you can make it! You’ll have tons of fun! &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you’re new to CTFs or you want to know more please check these links: &amp;lt;br&amp;gt;&lt;br /&gt;
* picoCTF (https://picoctf.com/): A good place for beginners to go through CTF tasks&lt;br /&gt;
*Computer and Network Security (http://ocw.cs.pub.ro/courses/cns): A masters class featuring concepts and tools on practical security&lt;br /&gt;
* Hack Night (https://github.com/isislab/Hack-Night): Training session run by the NYU Poly ISIS lab&lt;br /&gt;
* CTF Write-ups (https://github.com/ctfs/): Write-ups (solutions) for CTF contests arount the globe&lt;br /&gt;
* Online Wargames Bundle (http://security.cs.pub.ro/hexcellents/wiki/kb/practice-and-learning): A list of wargame sites you can use for honing your skills&lt;br /&gt;
&lt;br /&gt;
Prizes:&amp;lt;br&amp;gt;&lt;br /&gt;
[TBD]&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Team&amp;diff=250513</id>
		<title>OWASP Bucharest AppSec Conference 2019 Team</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Team&amp;diff=250513"/>
				<updated>2019-04-23T17:21:40Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Organizers''':&lt;br /&gt;
*Oana Cornea [http://ro.linkedin.com/pub/oana-cornea/55/430/b10]&lt;br /&gt;
*Cosmin Marius Ilie [https://ro.linkedin.com/in/iliec]&lt;br /&gt;
*Andreea Druga[https://www.linkedin.com/in/andreea-cristina-drug%C4%83-9ab61090/]&lt;br /&gt;
*Andreea Cutlacai [https://ro.linkedin.com/in/cutlacai-andreea-3117231b]&lt;br /&gt;
*Daniel Barbu [http://ro.linkedin.com/in/barbuionutdaniel?trk=pub-pbmap]&lt;br /&gt;
*Raluca Vasilache [https://ro.linkedin.com/in/rvasilache?trk=pub-pbmap]&lt;br /&gt;
*Vlad Cotenescu [https://ro.linkedin.com/in/vladcotenescu]&lt;br /&gt;
*Alexandra Tautan [https://ro.linkedin.com/in/alexandra-maria-t-36b56544]&lt;br /&gt;
*Uzoma Ogbonna [https://www.linkedin.com/in/uzoma-chigozie-ogbonna-9a908a77]&lt;br /&gt;
&lt;br /&gt;
'''CTF''':&lt;br /&gt;
*Razvan Deaconescu [https://ro.linkedin.com/in/razvandeaconescu]&lt;br /&gt;
*Vali Ghita [https://ro.linkedin.com/in/valighita]&lt;br /&gt;
*Vladimir Diaconescu&lt;br /&gt;
*Ștefania Popescu&lt;br /&gt;
*Alexandra Săndulescu&lt;br /&gt;
* Alexandru Razvan Caciulescu [https://www.linkedin.com/in/alexandru-razvan-caciulescu-049699106/]&lt;br /&gt;
&lt;br /&gt;
'''Photo'''&lt;br /&gt;
*Andreea Druga[https://www.linkedin.com/in/andreea-cristina-drug%C4%83-9ab61090/]&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Talks&amp;diff=250512</id>
		<title>OWASP Bucharest AppSec Conference 2019 Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Talks&amp;diff=250512"/>
				<updated>2019-04-23T17:20:20Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10.30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11.30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12.30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Agenda_Talks&amp;diff=250511</id>
		<title>OWASP Bucharest AppSec Conference 2019 Agenda Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Agenda_Talks&amp;diff=250511"/>
				<updated>2019-04-23T17:18:34Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11:30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(40 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | &amp;lt;b&amp;gt;Women in AppSec Panel&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:WiA_400x400.jpg | 50px ]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Sponsors&amp;diff=250510</id>
		<title>OWASP Bucharest AppSec Conference 2019 Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019_Sponsors&amp;diff=250510"/>
				<updated>2019-04-23T17:15:57Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;20&amp;quot; border=&amp;quot;0&amp;quot; valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Diamond  Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Platinum Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Gold Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;CTF and Dinner Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Event Supporters&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Infosec-conferences.png|250px|link=https://infosec-conferences.com/]]&lt;br /&gt;
| [[Image:RST.jpg|150px|center|link=https://rstforums.com/]]&lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019&amp;diff=250509</id>
		<title>OWASP Bucharest AppSec Conference 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019&amp;diff=250509"/>
				<updated>2019-04-23T17:14:19Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{{:OwaspHeader2019}}&lt;br /&gt;
&lt;br /&gt;
=Welcome= &lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''OWASP Bucharest AppSec Conference 2019 - October [TBD]'''&lt;br /&gt;
&lt;br /&gt;
OWASP Bucharest team is happy to announce the '''OWASP Bucharest AppSec Conference 2019''' a three days '''Security''' and '''Hacking Conference''' with additional training days dedicated to the application security. It will take place in October, 2019 - Bucharest, Romania. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The objective of the OWASP's Bucharest AppSec Conference is to raise awareness about application security and to bring high-quality security content provided by renowned professionals in the European region. Everyone is free to participate in OWASP and all our materials are available under a free and open software license.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/forms/d/e/1FAIpQLSf7dkZLWvmyNmpbx25M_MOo9ngOuGGsGEh8Mfdjo_TaeUo2Ug/viewform CALL FOR SPEAKERS]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://docs.google.com/forms/d/e/1FAIpQLSfVg3qu8GHFeHPhMda-C0izMz0G4bitNevmNrvA3z8Aobyk-w/viewform CALL FOR TRAININGS/WORKSHOPS]&lt;br /&gt;
{|&lt;br /&gt;
! style=&amp;quot;text-align:left;&amp;quot;| Important dates&lt;br /&gt;
! &lt;br /&gt;
|-&lt;br /&gt;
|Call for papers deadline: &lt;br /&gt;
|'''15th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Call for trainings deadline &lt;br /&gt;
|'''15th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|The final agenda will be published after &lt;br /&gt;
|'''1st of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|CTF qualifiers will be on&lt;br /&gt;
|'''[TBD] September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference trainings day is&lt;br /&gt;
|'''[TBD] October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference trainings and CTF final day is&lt;br /&gt;
|'''[TBD] October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference presentation tracks and workshops day is&lt;br /&gt;
|'''[TBD] October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Who Should Attend?'''&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals interested in improving IT Security&lt;br /&gt;
*Anyone interested in learning about or promoting Web Application Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; |  &lt;br /&gt;
'''CONFERENCE (Friday [TBD] of October)''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [TBD], 8.00 AM&amp;lt;br&amp;gt; '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location:''' [TBD] '''Workshops''': [TBD]&amp;lt;br&amp;gt;&lt;br /&gt;
'''Venue Address''':  Bucharest, Romania &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | The conference entrance is '''FREE''', you need to register on the link provided below, print your ticket and present it at the entrance.&amp;lt;br&amp;gt; The training sessions will be paid. The workshops and CTF attendance is free of charge&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2018-tickets-47960216298#tickets  Registration]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Limited number of seats! ''' &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Become a sponsor=&lt;br /&gt;
[https://www.owasp.org/images/6/6b/OWASPAppSecBucharest2019-sponsorshipopportunities.pdf &amp;lt;b&amp;gt;Sponshorship opportunities&amp;lt;/b&amp;gt; ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Why sponsor?&amp;lt;/b&amp;gt;&lt;br /&gt;
*Join 300+ leaders, security consultants, security architects and developers gathered to share cutting-edge ideas, initiatives and trends in technology. &lt;br /&gt;
*OWASP events attract an audience interested in &amp;quot;What's next?&amp;quot; - As a sponsor, you will be promoted as an answer to this question.&lt;br /&gt;
*Increase awareness and recognition in Romanian Security IT environment.&lt;br /&gt;
*Support and involvement in the world of information security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
=Conference 0101 talks=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Agenda_Talks}}&lt;br /&gt;
&lt;br /&gt;
=Conference 1010 talks=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Talks}}&lt;br /&gt;
&lt;br /&gt;
=WiA=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_WiA}}&lt;br /&gt;
&lt;br /&gt;
=Free workshops=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Workshops}}&lt;br /&gt;
&lt;br /&gt;
=2 days training=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Training2}}&lt;br /&gt;
&lt;br /&gt;
=CTF=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_CTF}}&lt;br /&gt;
&lt;br /&gt;
=Team=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Team}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Sponsors}}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019&amp;diff=250506</id>
		<title>OWASP Bucharest AppSec Conference 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019&amp;diff=250506"/>
				<updated>2019-04-23T16:37:08Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{{:OwaspHeader2019}}&lt;br /&gt;
&lt;br /&gt;
=Welcome= &lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''OWASP Bucharest AppSec Conference 2019 - October [TBD]'''&lt;br /&gt;
&lt;br /&gt;
OWASP Bucharest team is happy to announce the '''OWASP Bucharest AppSec Conference 2019''' a three days '''Security''' and '''Hacking Conference''' with additional training days dedicated to the application security. It will take place in October, 2019 - Bucharest, Romania. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The objective of the OWASP's Bucharest AppSec Conference is to raise awareness about application security and to bring high-quality security content provided by renowned professionals in the European region. Everyone is free to participate in OWASP and all our materials are available under a free and open software license.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
! style=&amp;quot;text-align:left;&amp;quot;| Important dates&lt;br /&gt;
! &lt;br /&gt;
|-&lt;br /&gt;
|Call for papers deadline: &lt;br /&gt;
|'''15th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Call for trainings deadline &lt;br /&gt;
|'''15th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|The final agenda will be published after &lt;br /&gt;
|'''1st of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|CTF qualifiers will be on&lt;br /&gt;
|'''[TBD] September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference trainings day is&lt;br /&gt;
|'''[TBD] October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference trainings and CTF final day is&lt;br /&gt;
|'''[TBD] October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference presentation tracks and workshops day is&lt;br /&gt;
|'''[TBD] October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Who Should Attend?'''&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals interested in improving IT Security&lt;br /&gt;
*Anyone interested in learning about or promoting Web Application Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; |  &lt;br /&gt;
'''CONFERENCE (Friday [TBD] of October)''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [TBD], 8.00 AM&amp;lt;br&amp;gt; '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location:''' [TBD] '''Workshops''': [TBD]&amp;lt;br&amp;gt;&lt;br /&gt;
'''Venue Address''':  Bucharest, Romania &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | The conference entrance is '''FREE''', you need to register on the link provided below, print your ticket and present it at the entrance.&amp;lt;br&amp;gt; The training sessions will be paid. The workshops and CTF attendance is free of charge&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2018-tickets-47960216298#tickets  Registration]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Limited number of seats! ''' &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Become a sponsor=&lt;br /&gt;
[https://www.owasp.org/images/6/6b/OWASPAppSecBucharest2019-sponsorshipopportunities.pdf &amp;lt;b&amp;gt;Sponshorship opportunities&amp;lt;/b&amp;gt; ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Why sponsor?&amp;lt;/b&amp;gt;&lt;br /&gt;
*Join 300+ leaders, security consultants, security architects and developers gathered to share cutting-edge ideas, initiatives and trends in technology. &lt;br /&gt;
*OWASP events attract an audience interested in &amp;quot;What's next?&amp;quot; - As a sponsor, you will be promoted as an answer to this question.&lt;br /&gt;
*Increase awareness and recognition in Romanian Security IT environment.&lt;br /&gt;
*Support and involvement in the world of information security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
=Conference 0101 talks=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Agenda_Talks}}&lt;br /&gt;
&lt;br /&gt;
=Conference 1010 talks=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Talks}}&lt;br /&gt;
&lt;br /&gt;
=WiA=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_WiA}}&lt;br /&gt;
&lt;br /&gt;
=Free workshops=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Workshops}}&lt;br /&gt;
&lt;br /&gt;
=2 days training=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Training2}}&lt;br /&gt;
&lt;br /&gt;
=CTF=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_CTF}}&lt;br /&gt;
&lt;br /&gt;
=Team=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Team}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Sponsors}}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPAppSecBucharest2019-sponsorshipopportunities.pdf&amp;diff=250505</id>
		<title>File:OWASPAppSecBucharest2019-sponsorshipopportunities.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPAppSecBucharest2019-sponsorshipopportunities.pdf&amp;diff=250505"/>
				<updated>2019-04-23T16:36:47Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OwaspHeader2019&amp;diff=250504</id>
		<title>OwaspHeader2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OwaspHeader2019&amp;diff=250504"/>
				<updated>2019-04-23T16:34:26Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:HeaderBucharest2019.png|center]].&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OwaspHeader2019&amp;diff=250503</id>
		<title>OwaspHeader2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OwaspHeader2019&amp;diff=250503"/>
				<updated>2019-04-23T16:33:22Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:HeaderBucharest2019.PNG |center]].&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:HeaderBucharest2019.png&amp;diff=250502</id>
		<title>File:HeaderBucharest2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:HeaderBucharest2019.png&amp;diff=250502"/>
				<updated>2019-04-23T16:32:09Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019&amp;diff=250501</id>
		<title>OWASP Bucharest AppSec Conference 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019&amp;diff=250501"/>
				<updated>2019-04-23T16:30:33Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{{:OwaspHeader2019}}&lt;br /&gt;
&lt;br /&gt;
=Welcome= &lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''OWASP Bucharest AppSec Conference 2019 - October [TBD]'''&lt;br /&gt;
&lt;br /&gt;
OWASP Bucharest team is happy to announce the '''OWASP Bucharest AppSec Conference 2019''' a three days '''Security''' and '''Hacking Conference''' with additional training days dedicated to the application security. It will take place in October, 2019 - Bucharest, Romania. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The objective of the OWASP's Bucharest AppSec Conference is to raise awareness about application security and to bring high-quality security content provided by renowned professionals in the European region. Everyone is free to participate in OWASP and all our materials are available under a free and open software license.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
! style=&amp;quot;text-align:left;&amp;quot;| Important dates&lt;br /&gt;
! &lt;br /&gt;
|-&lt;br /&gt;
|Call for papers deadline: &lt;br /&gt;
|'''24th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Call for trainings deadline &lt;br /&gt;
|'''24th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|The final agenda will be published after &lt;br /&gt;
|'''1st of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|CTF qualifiers will be on&lt;br /&gt;
|'''29th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference trainings day is&lt;br /&gt;
|'''24th of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference trainings and CTF final day is&lt;br /&gt;
|'''25th of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference presentation tracks and workshops day is&lt;br /&gt;
|'''26th of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Who Should Attend?'''&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals interested in improving IT Security&lt;br /&gt;
*Anyone interested in learning about or promoting Web Application Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; |  &lt;br /&gt;
'''CONFERENCE (Friday 26th of October)''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [TBD], 8.00 AM&amp;lt;br&amp;gt; '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location:''' [TBD] '''Workshops''': [TBD]&amp;lt;br&amp;gt;&lt;br /&gt;
'''Venue Address''':  Bucharest, Romania &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | The conference entrance is '''FREE''', you need to register on the link provided below, print your ticket and present it at the entrance.&amp;lt;br&amp;gt; The training sessions will be paid. The workshops and CTF attendance is free of charge&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2018-tickets-47960216298#tickets  Registration]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Limited number of seats! ''' &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Become a sponsor=&lt;br /&gt;
[https://www.owasp.org/images/d/d3/OWASPAppSecBucharest2018-sponsorshipopportunities.pdf &amp;lt;b&amp;gt;Sponshorship opportunities&amp;lt;/b&amp;gt; ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Why sponsor?&amp;lt;/b&amp;gt;&lt;br /&gt;
*Join 300+ leaders, security consultants, security architects and developers gathered to share cutting-edge ideas, initiatives and trends in technology. &lt;br /&gt;
*OWASP events attract an audience interested in &amp;quot;What's next?&amp;quot; - As a sponsor, you will be promoted as an answer to this question.&lt;br /&gt;
*Increase awareness and recognition in Romanian Security IT environment.&lt;br /&gt;
*Support and involvement in the world of information security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
=Conference 0101 talks=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Agenda_Talks}}&lt;br /&gt;
&lt;br /&gt;
=Conference 1010 talks=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Talks}}&lt;br /&gt;
&lt;br /&gt;
=WiA=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_WiA}}&lt;br /&gt;
&lt;br /&gt;
=Free workshops=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Workshops}}&lt;br /&gt;
&lt;br /&gt;
=2 days training=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Training2}}&lt;br /&gt;
&lt;br /&gt;
=CTF=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_CTF}}&lt;br /&gt;
&lt;br /&gt;
=Team=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Team}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Sponsors}}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019&amp;diff=250500</id>
		<title>OWASP Bucharest AppSec Conference 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2019&amp;diff=250500"/>
				<updated>2019-04-23T16:30:05Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: Created page with &amp;quot;__NOTOC__   {{:OwaspHeader2019}}  =Welcome=  {| style=&amp;quot;width: 100%;&amp;quot; |- | style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; |  {| style=&amp;quot;border: 0px solid ; background: transparent no...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{{:OwaspHeader2019}}&lt;br /&gt;
&lt;br /&gt;
=Welcome= &lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''OWASP Bucharest AppSec Conference 2018 - October 24th - 26th'''&lt;br /&gt;
&lt;br /&gt;
OWASP Bucharest team is happy to announce the '''OWASP Bucharest AppSec Conference 2019''' a three days '''Security''' and '''Hacking Conference''' with additional training days dedicated to the application security. It will take place in October, 2019 - Bucharest, Romania. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The objective of the OWASP's Bucharest AppSec Conference is to raise awareness about application security and to bring high-quality security content provided by renowned professionals in the European region. Everyone is free to participate in OWASP and all our materials are available under a free and open software license.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
! style=&amp;quot;text-align:left;&amp;quot;| Important dates&lt;br /&gt;
! &lt;br /&gt;
|-&lt;br /&gt;
|Call for papers deadline: &lt;br /&gt;
|'''24th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Call for trainings deadline &lt;br /&gt;
|'''24th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|The final agenda will be published after &lt;br /&gt;
|'''1st of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|CTF qualifiers will be on&lt;br /&gt;
|'''29th of September 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference trainings day is&lt;br /&gt;
|'''24th of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference trainings and CTF final day is&lt;br /&gt;
|'''25th of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|Conference presentation tracks and workshops day is&lt;br /&gt;
|'''26th of October 2019'''&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Who Should Attend?'''&lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals interested in improving IT Security&lt;br /&gt;
*Anyone interested in learning about or promoting Web Application Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; |  &lt;br /&gt;
'''CONFERENCE (Friday 26th of October)''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [TBD], 8.00 AM&amp;lt;br&amp;gt; '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location:''' [TBD] '''Workshops''': [TBD]&amp;lt;br&amp;gt;&lt;br /&gt;
'''Venue Address''':  Bucharest, Romania &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | The conference entrance is '''FREE''', you need to register on the link provided below, print your ticket and present it at the entrance.&amp;lt;br&amp;gt; The training sessions will be paid. The workshops and CTF attendance is free of charge&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2018-tickets-47960216298#tickets  Registration]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Limited number of seats! ''' &lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Become a sponsor=&lt;br /&gt;
[https://www.owasp.org/images/d/d3/OWASPAppSecBucharest2018-sponsorshipopportunities.pdf &amp;lt;b&amp;gt;Sponshorship opportunities&amp;lt;/b&amp;gt; ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Why sponsor?&amp;lt;/b&amp;gt;&lt;br /&gt;
*Join 300+ leaders, security consultants, security architects and developers gathered to share cutting-edge ideas, initiatives and trends in technology. &lt;br /&gt;
*OWASP events attract an audience interested in &amp;quot;What's next?&amp;quot; - As a sponsor, you will be promoted as an answer to this question.&lt;br /&gt;
*Increase awareness and recognition in Romanian Security IT environment.&lt;br /&gt;
*Support and involvement in the world of information security enthusiasts.&lt;br /&gt;
&lt;br /&gt;
=Conference 0101 talks=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Agenda_Talks}}&lt;br /&gt;
&lt;br /&gt;
=Conference 1010 talks=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Talks}}&lt;br /&gt;
&lt;br /&gt;
=WiA=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_WiA}}&lt;br /&gt;
&lt;br /&gt;
=Free workshops=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Workshops}}&lt;br /&gt;
&lt;br /&gt;
=2 days training=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Training2}}&lt;br /&gt;
&lt;br /&gt;
=CTF=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_CTF}}&lt;br /&gt;
&lt;br /&gt;
=Team=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Team}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
{{:OWASP_Bucharest_AppSec_Conference_2019_Sponsors}}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-Tales-of-practical-penetration-testing.pdf&amp;diff=244732</id>
		<title>File:OWASP-Tales-of-practical-penetration-testing.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-Tales-of-practical-penetration-testing.pdf&amp;diff=244732"/>
				<updated>2018-10-30T17:35:58Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: Oana Cornea uploaded a new version of File:OWASP-Tales-of-practical-penetration-testing.pdf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244731</id>
		<title>OWASP Bucharest AppSec Conference 2018 Agenda Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244731"/>
				<updated>2018-10-30T17:30:05Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda, 26th of October &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/7/79/OWASP_Bucharest-Day2018_so_you_think_you_do_security.pdf So you think you do security?]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/martin-knobloch/ Martin Knobloch]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Security is hot and we get all the fancy old and new titles: Chief Information Security Officer, Security Archtect, Security Tester, Security Engineer, Security and Risk Auditor! Of course, now the days you are falling behind if you do not have cyber in your title or job description, giving us the possibility of more fancy titles as for exampel 'Cyer security expert'! And we all doing security, right? Really, do you think you 'do security'?  &lt;br /&gt;
As if compliancy has not been complex enough, let's add privacy vs security and don't forgeth moving to cloud and serverless architectures. Do you still think you are in control? Let me lift the smoke screen of cyber security obscurity and show you how to do security right! Getting in control buttom up and top down (is there really a choice), by building alliances, sharing knowledge and deligate responsibilities. Not the least by setting the right examples!&lt;br /&gt;
Let me show you an holistic but practical aproach adding security to your business responsibilityies and development metrics. Get control by let go and enable scalable security for your software factories. How to manage security in traditional waterfall and project centric envirnoments and how to scale in the agile worlds of DevOps and CD/CI!&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/a/a2/Browsers-for-better-or-worse-owasp.pdf Browsers - For better or worse ...]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://pt.linkedin.com/in/simpsonpt Renato Rodrigues]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | It is no news that security is under close scrutiny of the public eye. Everyone is on alert for the latest database leak, closely tracking the updates on the business losing millions on a hack or digging deep into the web to find ways to stay protected. In this presentation, we'll tap into the role browsers play from the security practices perspective - regarding defense and browsers as attack platforms. While some of the tricks covered in this presentation will be recognizable for most in the community, others are still kept away from the limelight. Hopefully, in the end, you will be able to take something new for your assessments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11:30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/a/ac/Access_control%2C_REST_and_sessions.pdf Access control, REST and sessions]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/johanpeeters Johan Peeters]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |There is a lot of confusion surrounding REST, state, sessions, and the implications for access control. Let’s clear this up. &amp;lt;br&amp;gt;&lt;br /&gt;
REST services are stateless. In other words, there are no sessions between REST API producers and consumers. Given the difficulties of securing sessions, this is A Good Thing from a security perspective. &amp;lt;br&amp;gt;&lt;br /&gt;
Access to REST APIs is incumbent on the presentation of a valid security token. Typically, this is an access token issued by an OAuth authorization server. The authZ server maintains a session with the user agent so that the user does not need to re-authenticate each time a new access token is needed. This is not entirely unproblematic, as will be illustrated through a discussion of logout and the tenuous implementation of silent authentication in client libraries. Conversely, I will argue for leveraging authorization server sessions to raise the consent game to a level where it truly serves the interests of the user.&amp;lt;br&amp;gt;&lt;br /&gt;
In summary, while REST APIs are stateless and do not maintain a session, access control architectures *do* rely on sessions trying to provide a good user experience while enforcing authorization policies.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |[https://www.owasp.org/images/5/53/20181021_-_Cookies_vs_tokens_-_A_paradoxial_choice_%28AppSec_Bucharest%29_small.pdf Cookies versus tokens: a paradoxical choice]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/philippederyck/ Philippe De Ryck]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |When you’re building Angular applications, you will need to figure out how to manage your user’s sessions. Back in the days, this used to be simple. But now, there are many different options, all with specific advantages and disadvantages. How can you make a sensible choice, and how will that impact the security of your application?&amp;lt;br&amp;gt;&lt;br /&gt;
This talk lays it out for you. We dive into the technicalities of cookies, JWT tokens and Authorization headers. You will learn how to assess your past choices, and how to substantiate future decisions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(40 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | &amp;lt;b&amp;gt;Women in AppSec Panel&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:WiA_400x400.jpg | 50px ]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/1/14/Prezentare-Owasp-Ilca-Lucian-Florin.pptx Short A.V Evasion and Fast Incident Response]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lucian Ilca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | The field of Anti-Virus Evasion and Fast Incident Response, combined with Malware Analysis comprises the art and science of dissecting malicious software using diverse tools like: FLARE, Cuckoo Sandbox or other forensics tools and response immediatly to any type of incident. &lt;br /&gt;
The study and analysis of these tools fall within the general purview of the broad disciplines of Digital Forensics, PSIRT, Cyber Security Operations and general principles of Reverse Engineering. &lt;br /&gt;
In this paper, we explore and discuss the current state of anti-virus evasion, malware analysis and fast incident response, . &lt;br /&gt;
Based on author research, he conclude that the domain of malware analysis, A.V Evasion and Fast Incident Response has effectively been relegated from the academic realm to the domain of the practitioner's skill set. &lt;br /&gt;
For the final presentation, author will show how you can respond to an incident and how to protect your environment for new attacks. &amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/5/53/OWASP_CTI_Presentation_Calita_Cristi.pptx Secure your cyber battlefield leveraging cyber threat intelligence]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Cristian Calita&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Cyber crime, Cyber environment, Cyber activities, Cyber security, etc - Cyber is the new black. Therefore cyber threat intelligence (CTI) was expected to arise. &amp;lt;br&amp;gt;&lt;br /&gt;
As web applications are important pieces of the operational environment - at least to the fact that these may be entry points into internal networks, one of the CTI's goals is to keep the defenders (e.g. application security architects, application developers, etc) and stakeholders ahead threats and adversaries by feeding them with the missing piece from their knowledge. The presentation provides details on how this goal could be achieved.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Automating Security Operations using Phantom&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Isabella Minca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Our challenge consists in working with a SIEM which manages over 30 TB of logs per day and over 100 different types of Security Alerts, triggered based on the logs. Challenge accepted! This presentation aims to reveal our efforts towards automating Security Alerts triaging workflow using a Python based tool, Phantom.  We investigate further and decide upon the actions needed in order to remediate the vulnerabilities. A wide range of workflow actions can be automated, such as running searches or scripts that enrich alert data, reporting and proactively resolving security misconfigurations using various app integrations like Exchange, Slack and Jira. While the adoption of such an initiative is not a quick win but a bumpy road, it easily results in translating the day-to-day Security Operations Center work into a highly scalable, automated and tailored approach when it comes to dealing with the threat landscape! As a consequence, the whole organisation is moving towards a world of SecDevOps.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Browsers-for-better-or-worse-owasp.pdf&amp;diff=244730</id>
		<title>File:Browsers-for-better-or-worse-owasp.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Browsers-for-better-or-worse-owasp.pdf&amp;diff=244730"/>
				<updated>2018-10-30T17:29:29Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Bucharest-Day2018_so_you_think_you_do_security.pdf&amp;diff=244729</id>
		<title>File:OWASP Bucharest-Day2018 so you think you do security.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Bucharest-Day2018_so_you_think_you_do_security.pdf&amp;diff=244729"/>
				<updated>2018-10-30T17:28:44Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Cosmin_Radu_2018.pptx&amp;diff=244697</id>
		<title>File:OWASP Cosmin Radu 2018.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Cosmin_Radu_2018.pptx&amp;diff=244697"/>
				<updated>2018-10-28T21:15:34Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: Oana Cornea uploaded a new version of File:OWASP Cosmin Radu 2018.pptx&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Talks&amp;diff=244690</id>
		<title>OWASP Bucharest AppSec Conference 2018 Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Talks&amp;diff=244690"/>
				<updated>2018-10-28T16:52:50Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda, 26th of October &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | It's a World of SecDevOps @ OWASP&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://ro.linkedin.com/in/barbuionutdaniel/en Daniel Barbu]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | SecDevOps comes with a built-in security mindset and ideally adopts the proven practices already in use by embedded SRE teams. Day-to-day activities for this role contribute not only to achievement of operational and development goals but also to keeping high levels of confidentiality, integrity and availability. While improving the security posture, the processes become easier to audit and compliance controls better assessed. With product teams engaging with security as early as possible as opposed to the end of the project, the focus shifts from a reactive approach to a proactive one integrating defensive practices through the lifecycle. Consequently the systems’ predictability and understanding of the infrastructure behavior increases. When possible, open security issues should be tracked in the same work tracking system that Development and Operations are using, ensuring visibility and prioritization  against all other work. Infosec being embedded within the product teams, enables informed decisions by gaining business context. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10.30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/4/4b/OWASP-Tales-of-practical-penetration-testing.pdf Tales of Practical Android Penetration Testing (Mobile Pentest Toolkit)]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/alexander-subbotin-11290510a Alexander Subbotin]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | A vast number of open source tools and commercial products has been developed to support the security analysis of mobile apps. It has become a great challenge for a penetration tester to choose suitable or the best tools and the adequate pentest environment/distribution. And even when the test tools have been chosen, the problem remains that most of the tools only offer a CLI interface and that their usage can be very time consuming.&lt;br /&gt;
In order to automatize the setup of the test environment and the common processes during a mobile pentest, the author has developed the &amp;quot;Mobile Pentest Toolkit&amp;quot; (PMT). This toolkit takes over recurring and time consuming tasks for the tester. It has a standardized user interface for the usage of locally installed security tools (and installs them on demand). An example of use is: After the tester has modified the Smali code, the generation of a valid and signed APK file only takes a few moments. Aside from that, this talk illustrates techniques for dynamic analysis and tracking of changes within the app. The goal is to present the Mobile Pentest Toolkit to an interested audience and to publish it as an open source tool. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11.30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/6/65/OWASP_Bucharest_AppSec_2018_-_Breaking_the_iOS_Sandbox_-_Razvan_Deaconescu.pdf Breaking the Apple iOS Sandbox]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://ro.linkedin.com/in/razvandeaconescu Razvan Deaconescu]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Apple iOS uses sandboxing to confine apps to certain calls they can make to services and the kernel. Apps are attached a sandbox profile: a set of rules that allow or deny actions. All 3rd party apps (i.e. downloaded from the AppStore) use the same sandbox profile (container). Sandbox profiles are stored as binary blobs in the iOS kernel. &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, I will highlight the way iOS sandboxing works and steps we undertook in reversing binary blobs. We then analyzed reversed human-readable sandbox profiles and found misconfigurations in the profiles that allowed crippling the system from a valid app. We let Apple know of our findings, now published as CVEs.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12.30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/f/fe/OWASP_Cosmin_Radu_2018.pptx Evading your protection and exfiltrate data]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/cosminradu13 Cosmin Alexandru Radu]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |Evading your protection and exfiltrate data&lt;br /&gt;
This presentation is meant to be an introduction into a number of ex-filtration techniques that are out there, used by malicious attackers. It should be a view into the attackers toolset for developers and how they can counteract the issues attackers use to get data out of their applications, or how system administrators can guard their network against egress data leakage.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Top 10 with .NET Core&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://ro.linkedin.com/in/ignatandrei Andrei Ignat]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | We will show OWASP Top 10 and how to counter them in .NET Core&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/7/77/OWASP_Gabriel_Pilat_talk.pptx AWS VMS]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://ro.linkedin.com/in/gabriel-pilat-3053229b Gabriel Pilat]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | This presentation looks at how Vulnerability Management is generally performed (Scanning, Asset management, Reporting, TI etc. ), how it can be performed in the Amazon Cloud ( Deploy scanners, Use Integrated scanner, etc), the possibilities of automation Amazon offers and ways to integrate it with 3rd party tools such as Qualys. General AWS architecture, security services and benefits, inherited security flaws, issues and limitations encountered. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Protecting company information for GDPR compliance. A software architect’s perspective.&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Ovidiu Ariton&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |For years cybersecurity has been approached at the network level and at endpoint level. Best practices are good but sometimes user behavior makes the difference between a compromised system and a safe one. Most of the times they don’t understand if something went wrong. What if they knew? &amp;lt;br&amp;gt;&lt;br /&gt;
The solution that I am going to present brings the tools available in a SOC to the user level, at the endpoint. It combines some of the best practices in security (like backup and DLP) with SOAR solutions and LRA in order to prevent loss of data and ensure rapid automated reaction to cybersecurity incidents.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/8/82/OWASP-SB.pptx DevSecOps Use Case: Automate Early… But Securely]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Serban Bejan&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |In today’s increasingly digitalized world, the need for security in DevOps is met by a new concept, called DevSecOps. Aimed at creating and including modern security practices that can be incorporated into the fast and agile world of DevOps, DevSecOps is, in fact, an extension of DevOps’ main goal. &amp;lt;br&amp;gt; &lt;br /&gt;
In our use case we studied the possible benefits and challenges of integrating SAST and DAST tools into the existing toolchain (application lifecycle manager, IDE, source code management tool and continuous integration pipeline) for developing, deploying and testing a Java web application.&amp;lt;br&amp;gt;&lt;br /&gt;
Implementing DevSecOps brings a lot of value to organizations, it also comes with some challenges, like integrating more agile security methods and properly training users for using these advanced tools. Last but not least, we also need to take into consideration that any security functionality not automated in the available tools will result in creating friction in the cycle.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-SB.pptx&amp;diff=244689</id>
		<title>File:OWASP-SB.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-SB.pptx&amp;diff=244689"/>
				<updated>2018-10-28T16:52:35Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Gabriel_Pilat_talk.pptx&amp;diff=244688</id>
		<title>File:OWASP Gabriel Pilat talk.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Gabriel_Pilat_talk.pptx&amp;diff=244688"/>
				<updated>2018-10-28T16:51:19Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Cosmin_Radu_2018.pptx&amp;diff=244687</id>
		<title>File:OWASP Cosmin Radu 2018.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Cosmin_Radu_2018.pptx&amp;diff=244687"/>
				<updated>2018-10-28T16:50:39Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Bucharest_AppSec_2018_-_Breaking_the_iOS_Sandbox_-_Razvan_Deaconescu.pdf&amp;diff=244686</id>
		<title>File:OWASP Bucharest AppSec 2018 - Breaking the iOS Sandbox - Razvan Deaconescu.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Bucharest_AppSec_2018_-_Breaking_the_iOS_Sandbox_-_Razvan_Deaconescu.pdf&amp;diff=244686"/>
				<updated>2018-10-28T16:49:20Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-Tales-of-practical-penetration-testing.pdf&amp;diff=244685</id>
		<title>File:OWASP-Tales-of-practical-penetration-testing.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-Tales-of-practical-penetration-testing.pdf&amp;diff=244685"/>
				<updated>2018-10-28T16:48:31Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244684</id>
		<title>OWASP Bucharest AppSec Conference 2018 Agenda Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244684"/>
				<updated>2018-10-28T16:46:23Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda, 26th of October &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | So you think you do security?&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/martin-knobloch/ Martin Knobloch]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Security is hot and we get all the fancy old and new titles: Chief Information Security Officer, Security Archtect, Security Tester, Security Engineer, Security and Risk Auditor! Of course, now the days you are falling behind if you do not have cyber in your title or job description, giving us the possibility of more fancy titles as for exampel 'Cyer security expert'! And we all doing security, right? Really, do you think you 'do security'?  &lt;br /&gt;
As if compliancy has not been complex enough, let's add privacy vs security and don't forgeth moving to cloud and serverless architectures. Do you still think you are in control? Let me lift the smoke screen of cyber security obscurity and show you how to do security right! Getting in control buttom up and top down (is there really a choice), by building alliances, sharing knowledge and deligate responsibilities. Not the least by setting the right examples!&lt;br /&gt;
Let me show you an holistic but practical aproach adding security to your business responsibilityies and development metrics. Get control by let go and enable scalable security for your software factories. How to manage security in traditional waterfall and project centric envirnoments and how to scale in the agile worlds of DevOps and CD/CI!&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://slides.com/simpson/browsers-for-better-or-worse-owasp/#/ Browsers - For better or worse ...]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://pt.linkedin.com/in/simpsonpt Renato Rodrigues]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | It is no news that security is under close scrutiny of the public eye. Everyone is on alert for the latest database leak, closely tracking the updates on the business losing millions on a hack or digging deep into the web to find ways to stay protected. In this presentation, we'll tap into the role browsers play from the security practices perspective - regarding defense and browsers as attack platforms. While some of the tricks covered in this presentation will be recognizable for most in the community, others are still kept away from the limelight. Hopefully, in the end, you will be able to take something new for your assessments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11:30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/a/ac/Access_control%2C_REST_and_sessions.pdf Access control, REST and sessions]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/johanpeeters Johan Peeters]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |There is a lot of confusion surrounding REST, state, sessions, and the implications for access control. Let’s clear this up. &amp;lt;br&amp;gt;&lt;br /&gt;
REST services are stateless. In other words, there are no sessions between REST API producers and consumers. Given the difficulties of securing sessions, this is A Good Thing from a security perspective. &amp;lt;br&amp;gt;&lt;br /&gt;
Access to REST APIs is incumbent on the presentation of a valid security token. Typically, this is an access token issued by an OAuth authorization server. The authZ server maintains a session with the user agent so that the user does not need to re-authenticate each time a new access token is needed. This is not entirely unproblematic, as will be illustrated through a discussion of logout and the tenuous implementation of silent authentication in client libraries. Conversely, I will argue for leveraging authorization server sessions to raise the consent game to a level where it truly serves the interests of the user.&amp;lt;br&amp;gt;&lt;br /&gt;
In summary, while REST APIs are stateless and do not maintain a session, access control architectures *do* rely on sessions trying to provide a good user experience while enforcing authorization policies.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |[https://www.owasp.org/images/5/53/20181021_-_Cookies_vs_tokens_-_A_paradoxial_choice_%28AppSec_Bucharest%29_small.pdf Cookies versus tokens: a paradoxical choice]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/philippederyck/ Philippe De Ryck]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |When you’re building Angular applications, you will need to figure out how to manage your user’s sessions. Back in the days, this used to be simple. But now, there are many different options, all with specific advantages and disadvantages. How can you make a sensible choice, and how will that impact the security of your application?&amp;lt;br&amp;gt;&lt;br /&gt;
This talk lays it out for you. We dive into the technicalities of cookies, JWT tokens and Authorization headers. You will learn how to assess your past choices, and how to substantiate future decisions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(40 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | &amp;lt;b&amp;gt;Women in AppSec Panel&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:WiA_400x400.jpg | 50px ]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/1/14/Prezentare-Owasp-Ilca-Lucian-Florin.pptx Short A.V Evasion and Fast Incident Response]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lucian Ilca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | The field of Anti-Virus Evasion and Fast Incident Response, combined with Malware Analysis comprises the art and science of dissecting malicious software using diverse tools like: FLARE, Cuckoo Sandbox or other forensics tools and response immediatly to any type of incident. &lt;br /&gt;
The study and analysis of these tools fall within the general purview of the broad disciplines of Digital Forensics, PSIRT, Cyber Security Operations and general principles of Reverse Engineering. &lt;br /&gt;
In this paper, we explore and discuss the current state of anti-virus evasion, malware analysis and fast incident response, . &lt;br /&gt;
Based on author research, he conclude that the domain of malware analysis, A.V Evasion and Fast Incident Response has effectively been relegated from the academic realm to the domain of the practitioner's skill set. &lt;br /&gt;
For the final presentation, author will show how you can respond to an incident and how to protect your environment for new attacks. &amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/5/53/OWASP_CTI_Presentation_Calita_Cristi.pptx Secure your cyber battlefield leveraging cyber threat intelligence]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Cristian Calita&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Cyber crime, Cyber environment, Cyber activities, Cyber security, etc - Cyber is the new black. Therefore cyber threat intelligence (CTI) was expected to arise. &amp;lt;br&amp;gt;&lt;br /&gt;
As web applications are important pieces of the operational environment - at least to the fact that these may be entry points into internal networks, one of the CTI's goals is to keep the defenders (e.g. application security architects, application developers, etc) and stakeholders ahead threats and adversaries by feeding them with the missing piece from their knowledge. The presentation provides details on how this goal could be achieved.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Automating Security Operations using Phantom&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Isabella Minca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Our challenge consists in working with a SIEM which manages over 30 TB of logs per day and over 100 different types of Security Alerts, triggered based on the logs. Challenge accepted! This presentation aims to reveal our efforts towards automating Security Alerts triaging workflow using a Python based tool, Phantom.  We investigate further and decide upon the actions needed in order to remediate the vulnerabilities. A wide range of workflow actions can be automated, such as running searches or scripts that enrich alert data, reporting and proactively resolving security misconfigurations using various app integrations like Exchange, Slack and Jira. While the adoption of such an initiative is not a quick win but a bumpy road, it easily results in translating the day-to-day Security Operations Center work into a highly scalable, automated and tailored approach when it comes to dealing with the threat landscape! As a consequence, the whole organisation is moving towards a world of SecDevOps.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244683</id>
		<title>OWASP Bucharest AppSec Conference 2018 Agenda Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244683"/>
				<updated>2018-10-28T16:44:08Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda, 26th of October &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | So you think you do security?&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/martin-knobloch/ Martin Knobloch]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Security is hot and we get all the fancy old and new titles: Chief Information Security Officer, Security Archtect, Security Tester, Security Engineer, Security and Risk Auditor! Of course, now the days you are falling behind if you do not have cyber in your title or job description, giving us the possibility of more fancy titles as for exampel 'Cyer security expert'! And we all doing security, right? Really, do you think you 'do security'?  &lt;br /&gt;
As if compliancy has not been complex enough, let's add privacy vs security and don't forgeth moving to cloud and serverless architectures. Do you still think you are in control? Let me lift the smoke screen of cyber security obscurity and show you how to do security right! Getting in control buttom up and top down (is there really a choice), by building alliances, sharing knowledge and deligate responsibilities. Not the least by setting the right examples!&lt;br /&gt;
Let me show you an holistic but practical aproach adding security to your business responsibilityies and development metrics. Get control by let go and enable scalable security for your software factories. How to manage security in traditional waterfall and project centric envirnoments and how to scale in the agile worlds of DevOps and CD/CI!&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://slides.com/simpson/browsers-for-better-or-worse-owasp/#/ Browsers - For better or worse ...]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://pt.linkedin.com/in/simpsonpt Renato Rodrigues]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | It is no news that security is under close scrutiny of the public eye. Everyone is on alert for the latest database leak, closely tracking the updates on the business losing millions on a hack or digging deep into the web to find ways to stay protected. In this presentation, we'll tap into the role browsers play from the security practices perspective - regarding defense and browsers as attack platforms. While some of the tricks covered in this presentation will be recognizable for most in the community, others are still kept away from the limelight. Hopefully, in the end, you will be able to take something new for your assessments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11:30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/a/ac/Access_control%2C_REST_and_sessions.pdf Access control, REST and sessions]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/johanpeeters Johan Peeters]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |There is a lot of confusion surrounding REST, state, sessions, and the implications for access control. Let’s clear this up. &amp;lt;br&amp;gt;&lt;br /&gt;
REST services are stateless. In other words, there are no sessions between REST API producers and consumers. Given the difficulties of securing sessions, this is A Good Thing from a security perspective. &amp;lt;br&amp;gt;&lt;br /&gt;
Access to REST APIs is incumbent on the presentation of a valid security token. Typically, this is an access token issued by an OAuth authorization server. The authZ server maintains a session with the user agent so that the user does not need to re-authenticate each time a new access token is needed. This is not entirely unproblematic, as will be illustrated through a discussion of logout and the tenuous implementation of silent authentication in client libraries. Conversely, I will argue for leveraging authorization server sessions to raise the consent game to a level where it truly serves the interests of the user.&amp;lt;br&amp;gt;&lt;br /&gt;
In summary, while REST APIs are stateless and do not maintain a session, access control architectures *do* rely on sessions trying to provide a good user experience while enforcing authorization policies.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |[https://www.owasp.org/images/5/53/20181021_-_Cookies_vs_tokens_-_A_paradoxial_choice_%28AppSec_Bucharest%29_small.pdf Cookies versus tokens: a paradoxical choice]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/philippederyck/ Philippe De Ryck]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |When you’re building Angular applications, you will need to figure out how to manage your user’s sessions. Back in the days, this used to be simple. But now, there are many different options, all with specific advantages and disadvantages. How can you make a sensible choice, and how will that impact the security of your application?&amp;lt;br&amp;gt;&lt;br /&gt;
This talk lays it out for you. We dive into the technicalities of cookies, JWT tokens and Authorization headers. You will learn how to assess your past choices, and how to substantiate future decisions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(40 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | &amp;lt;b&amp;gt;Women in AppSec Panel&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:WiA_400x400.jpg | 50px ]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/1/14/Prezentare-Owasp-Ilca-Lucian-Florin.pptx Short A.V Evasion and Fast Incident Response]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lucian Ilca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | The field of Anti-Virus Evasion and Fast Incident Response, combined with Malware Analysis comprises the art and science of dissecting malicious software using diverse tools like: FLARE, Cuckoo Sandbox or other forensics tools and response immediatly to any type of incident. &lt;br /&gt;
The study and analysis of these tools fall within the general purview of the broad disciplines of Digital Forensics, PSIRT, Cyber Security Operations and general principles of Reverse Engineering. &lt;br /&gt;
In this paper, we explore and discuss the current state of anti-virus evasion, malware analysis and fast incident response, . &lt;br /&gt;
Based on author research, he conclude that the domain of malware analysis, A.V Evasion and Fast Incident Response has effectively been relegated from the academic realm to the domain of the practitioner's skill set. &lt;br /&gt;
For the final presentation, author will show how you can respond to an incident and how to protect your environment for new attacks. &amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/5/53/OWASP_CTI_Presentation_Calita_Cristi.pptx Secure your cyber battlefield leveraging cyber threat intelligence]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Cristian Calita&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Cyber crime, Cyber environment, Cyber activities, Cyber security, etc - Cyber is the new black. Therefore cyber threat intelligence (CTI) was expected to arise. &amp;lt;br&amp;gt;&lt;br /&gt;
As web applications are important pieces of the operational environment - at least to the fact that these may be entry points into internal networks, one of the CTI's goals is to keep the defenders (e.g. application security architects, application developers, etc) and stakeholders ahead threats and adversaries by feeding them with the missing piece from their knowledge. The presentation provides details on how this goal could be achieved.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/6/66/Automating_Security_Operations_using_Phantom.pptx Automating Security Operations using Phantom]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Isabella Minca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Our challenge consists in working with a SIEM which manages over 30 TB of logs per day and over 100 different types of Security Alerts, triggered based on the logs. Challenge accepted! This presentation aims to reveal our efforts towards automating Security Alerts triaging workflow using a Python based tool, Phantom.  We investigate further and decide upon the actions needed in order to remediate the vulnerabilities. A wide range of workflow actions can be automated, such as running searches or scripts that enrich alert data, reporting and proactively resolving security misconfigurations using various app integrations like Exchange, Slack and Jira. While the adoption of such an initiative is not a quick win but a bumpy road, it easily results in translating the day-to-day Security Operations Center work into a highly scalable, automated and tailored approach when it comes to dealing with the threat landscape! As a consequence, the whole organisation is moving towards a world of SecDevOps.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Prezentare-Owasp-Ilca-Lucian-Florin.pptx&amp;diff=244682</id>
		<title>File:Prezentare-Owasp-Ilca-Lucian-Florin.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Prezentare-Owasp-Ilca-Lucian-Florin.pptx&amp;diff=244682"/>
				<updated>2018-10-28T16:22:58Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244681</id>
		<title>OWASP Bucharest AppSec Conference 2018 Agenda Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244681"/>
				<updated>2018-10-28T16:21:21Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda, 26th of October &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | So you think you do security?&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/martin-knobloch/ Martin Knobloch]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Security is hot and we get all the fancy old and new titles: Chief Information Security Officer, Security Archtect, Security Tester, Security Engineer, Security and Risk Auditor! Of course, now the days you are falling behind if you do not have cyber in your title or job description, giving us the possibility of more fancy titles as for exampel 'Cyer security expert'! And we all doing security, right? Really, do you think you 'do security'?  &lt;br /&gt;
As if compliancy has not been complex enough, let's add privacy vs security and don't forgeth moving to cloud and serverless architectures. Do you still think you are in control? Let me lift the smoke screen of cyber security obscurity and show you how to do security right! Getting in control buttom up and top down (is there really a choice), by building alliances, sharing knowledge and deligate responsibilities. Not the least by setting the right examples!&lt;br /&gt;
Let me show you an holistic but practical aproach adding security to your business responsibilityies and development metrics. Get control by let go and enable scalable security for your software factories. How to manage security in traditional waterfall and project centric envirnoments and how to scale in the agile worlds of DevOps and CD/CI!&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Browsers - For better or worse ...&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://pt.linkedin.com/in/simpsonpt Renato Rodrigues]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | It is no news that security is under close scrutiny of the public eye. Everyone is on alert for the latest database leak, closely tracking the updates on the business losing millions on a hack or digging deep into the web to find ways to stay protected. In this presentation, we'll tap into the role browsers play from the security practices perspective - regarding defense and browsers as attack platforms. While some of the tricks covered in this presentation will be recognizable for most in the community, others are still kept away from the limelight. Hopefully, in the end, you will be able to take something new for your assessments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11:30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/a/ac/Access_control%2C_REST_and_sessions.pdf Access control, REST and sessions]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/johanpeeters Johan Peeters]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |There is a lot of confusion surrounding REST, state, sessions, and the implications for access control. Let’s clear this up. &amp;lt;br&amp;gt;&lt;br /&gt;
REST services are stateless. In other words, there are no sessions between REST API producers and consumers. Given the difficulties of securing sessions, this is A Good Thing from a security perspective. &amp;lt;br&amp;gt;&lt;br /&gt;
Access to REST APIs is incumbent on the presentation of a valid security token. Typically, this is an access token issued by an OAuth authorization server. The authZ server maintains a session with the user agent so that the user does not need to re-authenticate each time a new access token is needed. This is not entirely unproblematic, as will be illustrated through a discussion of logout and the tenuous implementation of silent authentication in client libraries. Conversely, I will argue for leveraging authorization server sessions to raise the consent game to a level where it truly serves the interests of the user.&amp;lt;br&amp;gt;&lt;br /&gt;
In summary, while REST APIs are stateless and do not maintain a session, access control architectures *do* rely on sessions trying to provide a good user experience while enforcing authorization policies.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |[https://www.owasp.org/images/5/53/20181021_-_Cookies_vs_tokens_-_A_paradoxial_choice_%28AppSec_Bucharest%29_small.pdf Cookies versus tokens: a paradoxical choice]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/philippederyck/ Philippe De Ryck]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |When you’re building Angular applications, you will need to figure out how to manage your user’s sessions. Back in the days, this used to be simple. But now, there are many different options, all with specific advantages and disadvantages. How can you make a sensible choice, and how will that impact the security of your application?&amp;lt;br&amp;gt;&lt;br /&gt;
This talk lays it out for you. We dive into the technicalities of cookies, JWT tokens and Authorization headers. You will learn how to assess your past choices, and how to substantiate future decisions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(40 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | &amp;lt;b&amp;gt;Women in AppSec Panel&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:WiA_400x400.jpg | 50px ]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Short A.V Evasion and Fast Incident Response&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lucian Ilca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | The field of Anti-Virus Evasion and Fast Incident Response, combined with Malware Analysis comprises the art and science of dissecting malicious software using diverse tools like: FLARE, Cuckoo Sandbox or other forensics tools and response immediatly to any type of incident. &lt;br /&gt;
The study and analysis of these tools fall within the general purview of the broad disciplines of Digital Forensics, PSIRT, Cyber Security Operations and general principles of Reverse Engineering. &lt;br /&gt;
In this paper, we explore and discuss the current state of anti-virus evasion, malware analysis and fast incident response, . &lt;br /&gt;
Based on author research, he conclude that the domain of malware analysis, A.V Evasion and Fast Incident Response has effectively been relegated from the academic realm to the domain of the practitioner's skill set. &lt;br /&gt;
For the final presentation, author will show how you can respond to an incident and how to protect your environment for new attacks. &amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/5/53/OWASP_CTI_Presentation_Calita_Cristi.pptx Secure your cyber battlefield leveraging cyber threat intelligence]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Cristian Calita&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Cyber crime, Cyber environment, Cyber activities, Cyber security, etc - Cyber is the new black. Therefore cyber threat intelligence (CTI) was expected to arise. &amp;lt;br&amp;gt;&lt;br /&gt;
As web applications are important pieces of the operational environment - at least to the fact that these may be entry points into internal networks, one of the CTI's goals is to keep the defenders (e.g. application security architects, application developers, etc) and stakeholders ahead threats and adversaries by feeding them with the missing piece from their knowledge. The presentation provides details on how this goal could be achieved.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/6/66/Automating_Security_Operations_using_Phantom.pptx Automating Security Operations using Phantom]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Isabella Minca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Our challenge consists in working with a SIEM which manages over 30 TB of logs per day and over 100 different types of Security Alerts, triggered based on the logs. Challenge accepted! This presentation aims to reveal our efforts towards automating Security Alerts triaging workflow using a Python based tool, Phantom.  We investigate further and decide upon the actions needed in order to remediate the vulnerabilities. A wide range of workflow actions can be automated, such as running searches or scripts that enrich alert data, reporting and proactively resolving security misconfigurations using various app integrations like Exchange, Slack and Jira. While the adoption of such an initiative is not a quick win but a bumpy road, it easily results in translating the day-to-day Security Operations Center work into a highly scalable, automated and tailored approach when it comes to dealing with the threat landscape! As a consequence, the whole organisation is moving towards a world of SecDevOps.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Automating_Security_Operations_using_Phantom.pptx&amp;diff=244680</id>
		<title>File:Automating Security Operations using Phantom.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Automating_Security_Operations_using_Phantom.pptx&amp;diff=244680"/>
				<updated>2018-10-28T16:18:48Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244679</id>
		<title>OWASP Bucharest AppSec Conference 2018 Agenda Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244679"/>
				<updated>2018-10-28T16:18:23Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda, 26th of October &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | So you think you do security?&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/martin-knobloch/ Martin Knobloch]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Security is hot and we get all the fancy old and new titles: Chief Information Security Officer, Security Archtect, Security Tester, Security Engineer, Security and Risk Auditor! Of course, now the days you are falling behind if you do not have cyber in your title or job description, giving us the possibility of more fancy titles as for exampel 'Cyer security expert'! And we all doing security, right? Really, do you think you 'do security'?  &lt;br /&gt;
As if compliancy has not been complex enough, let's add privacy vs security and don't forgeth moving to cloud and serverless architectures. Do you still think you are in control? Let me lift the smoke screen of cyber security obscurity and show you how to do security right! Getting in control buttom up and top down (is there really a choice), by building alliances, sharing knowledge and deligate responsibilities. Not the least by setting the right examples!&lt;br /&gt;
Let me show you an holistic but practical aproach adding security to your business responsibilityies and development metrics. Get control by let go and enable scalable security for your software factories. How to manage security in traditional waterfall and project centric envirnoments and how to scale in the agile worlds of DevOps and CD/CI!&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Browsers - For better or worse ...&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://pt.linkedin.com/in/simpsonpt Renato Rodrigues]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | It is no news that security is under close scrutiny of the public eye. Everyone is on alert for the latest database leak, closely tracking the updates on the business losing millions on a hack or digging deep into the web to find ways to stay protected. In this presentation, we'll tap into the role browsers play from the security practices perspective - regarding defense and browsers as attack platforms. While some of the tricks covered in this presentation will be recognizable for most in the community, others are still kept away from the limelight. Hopefully, in the end, you will be able to take something new for your assessments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11:30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/a/ac/Access_control%2C_REST_and_sessions.pdf Access control, REST and sessions]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/johanpeeters Johan Peeters]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |There is a lot of confusion surrounding REST, state, sessions, and the implications for access control. Let’s clear this up. &amp;lt;br&amp;gt;&lt;br /&gt;
REST services are stateless. In other words, there are no sessions between REST API producers and consumers. Given the difficulties of securing sessions, this is A Good Thing from a security perspective. &amp;lt;br&amp;gt;&lt;br /&gt;
Access to REST APIs is incumbent on the presentation of a valid security token. Typically, this is an access token issued by an OAuth authorization server. The authZ server maintains a session with the user agent so that the user does not need to re-authenticate each time a new access token is needed. This is not entirely unproblematic, as will be illustrated through a discussion of logout and the tenuous implementation of silent authentication in client libraries. Conversely, I will argue for leveraging authorization server sessions to raise the consent game to a level where it truly serves the interests of the user.&amp;lt;br&amp;gt;&lt;br /&gt;
In summary, while REST APIs are stateless and do not maintain a session, access control architectures *do* rely on sessions trying to provide a good user experience while enforcing authorization policies.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |[https://www.owasp.org/images/5/53/20181021_-_Cookies_vs_tokens_-_A_paradoxial_choice_%28AppSec_Bucharest%29_small.pdf Cookies versus tokens: a paradoxical choice]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/philippederyck/ Philippe De Ryck]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |When you’re building Angular applications, you will need to figure out how to manage your user’s sessions. Back in the days, this used to be simple. But now, there are many different options, all with specific advantages and disadvantages. How can you make a sensible choice, and how will that impact the security of your application?&amp;lt;br&amp;gt;&lt;br /&gt;
This talk lays it out for you. We dive into the technicalities of cookies, JWT tokens and Authorization headers. You will learn how to assess your past choices, and how to substantiate future decisions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(40 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | &amp;lt;b&amp;gt;Women in AppSec Panel&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:WiA_400x400.jpg | 50px ]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Short A.V Evasion and Fast Incident Response&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lucian Ilca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | The field of Anti-Virus Evasion and Fast Incident Response, combined with Malware Analysis comprises the art and science of dissecting malicious software using diverse tools like: FLARE, Cuckoo Sandbox or other forensics tools and response immediatly to any type of incident. &lt;br /&gt;
The study and analysis of these tools fall within the general purview of the broad disciplines of Digital Forensics, PSIRT, Cyber Security Operations and general principles of Reverse Engineering. &lt;br /&gt;
In this paper, we explore and discuss the current state of anti-virus evasion, malware analysis and fast incident response, . &lt;br /&gt;
Based on author research, he conclude that the domain of malware analysis, A.V Evasion and Fast Incident Response has effectively been relegated from the academic realm to the domain of the practitioner's skill set. &lt;br /&gt;
For the final presentation, author will show how you can respond to an incident and how to protect your environment for new attacks. &amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/5/53/OWASP_CTI_Presentation_Calita_Cristi.pptx Secure your cyber battlefield leveraging cyber threat intelligence]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Cristian Calita&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Cyber crime, Cyber environment, Cyber activities, Cyber security, etc - Cyber is the new black. Therefore cyber threat intelligence (CTI) was expected to arise. &amp;lt;br&amp;gt;&lt;br /&gt;
As web applications are important pieces of the operational environment - at least to the fact that these may be entry points into internal networks, one of the CTI's goals is to keep the defenders (e.g. application security architects, application developers, etc) and stakeholders ahead threats and adversaries by feeding them with the missing piece from their knowledge. The presentation provides details on how this goal could be achieved.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Automating Security Operations using Phantom&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Isabella Minca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Our challenge consists in working with a SIEM which manages over 30 TB of logs per day and over 100 different types of Security Alerts, triggered based on the logs. Challenge accepted! This presentation aims to reveal our efforts towards automating Security Alerts triaging workflow using a Python based tool, Phantom.  We investigate further and decide upon the actions needed in order to remediate the vulnerabilities. A wide range of workflow actions can be automated, such as running searches or scripts that enrich alert data, reporting and proactively resolving security misconfigurations using various app integrations like Exchange, Slack and Jira. While the adoption of such an initiative is not a quick win but a bumpy road, it easily results in translating the day-to-day Security Operations Center work into a highly scalable, automated and tailored approach when it comes to dealing with the threat landscape! As a consequence, the whole organisation is moving towards a world of SecDevOps.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Access_control,_REST_and_sessions.pdf&amp;diff=244678</id>
		<title>File:Access control, REST and sessions.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Access_control,_REST_and_sessions.pdf&amp;diff=244678"/>
				<updated>2018-10-28T16:17:59Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244677</id>
		<title>OWASP Bucharest AppSec Conference 2018 Agenda Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244677"/>
				<updated>2018-10-28T16:16:14Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda, 26th of October &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | So you think you do security?&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/martin-knobloch/ Martin Knobloch]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Security is hot and we get all the fancy old and new titles: Chief Information Security Officer, Security Archtect, Security Tester, Security Engineer, Security and Risk Auditor! Of course, now the days you are falling behind if you do not have cyber in your title or job description, giving us the possibility of more fancy titles as for exampel 'Cyer security expert'! And we all doing security, right? Really, do you think you 'do security'?  &lt;br /&gt;
As if compliancy has not been complex enough, let's add privacy vs security and don't forgeth moving to cloud and serverless architectures. Do you still think you are in control? Let me lift the smoke screen of cyber security obscurity and show you how to do security right! Getting in control buttom up and top down (is there really a choice), by building alliances, sharing knowledge and deligate responsibilities. Not the least by setting the right examples!&lt;br /&gt;
Let me show you an holistic but practical aproach adding security to your business responsibilityies and development metrics. Get control by let go and enable scalable security for your software factories. How to manage security in traditional waterfall and project centric envirnoments and how to scale in the agile worlds of DevOps and CD/CI!&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Browsers - For better or worse ...&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://pt.linkedin.com/in/simpsonpt Renato Rodrigues]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | It is no news that security is under close scrutiny of the public eye. Everyone is on alert for the latest database leak, closely tracking the updates on the business losing millions on a hack or digging deep into the web to find ways to stay protected. In this presentation, we'll tap into the role browsers play from the security practices perspective - regarding defense and browsers as attack platforms. While some of the tricks covered in this presentation will be recognizable for most in the community, others are still kept away from the limelight. Hopefully, in the end, you will be able to take something new for your assessments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11:30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Access control, REST and sessions&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/johanpeeters Johan Peeters]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |There is a lot of confusion surrounding REST, state, sessions, and the implications for access control. Let’s clear this up. &amp;lt;br&amp;gt;&lt;br /&gt;
REST services are stateless. In other words, there are no sessions between REST API producers and consumers. Given the difficulties of securing sessions, this is A Good Thing from a security perspective. &amp;lt;br&amp;gt;&lt;br /&gt;
Access to REST APIs is incumbent on the presentation of a valid security token. Typically, this is an access token issued by an OAuth authorization server. The authZ server maintains a session with the user agent so that the user does not need to re-authenticate each time a new access token is needed. This is not entirely unproblematic, as will be illustrated through a discussion of logout and the tenuous implementation of silent authentication in client libraries. Conversely, I will argue for leveraging authorization server sessions to raise the consent game to a level where it truly serves the interests of the user.&amp;lt;br&amp;gt;&lt;br /&gt;
In summary, while REST APIs are stateless and do not maintain a session, access control architectures *do* rely on sessions trying to provide a good user experience while enforcing authorization policies.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |[https://www.owasp.org/images/5/53/20181021_-_Cookies_vs_tokens_-_A_paradoxial_choice_%28AppSec_Bucharest%29_small.pdf Cookies versus tokens: a paradoxical choice]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/philippederyck/ Philippe De Ryck]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |When you’re building Angular applications, you will need to figure out how to manage your user’s sessions. Back in the days, this used to be simple. But now, there are many different options, all with specific advantages and disadvantages. How can you make a sensible choice, and how will that impact the security of your application?&amp;lt;br&amp;gt;&lt;br /&gt;
This talk lays it out for you. We dive into the technicalities of cookies, JWT tokens and Authorization headers. You will learn how to assess your past choices, and how to substantiate future decisions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(40 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | &amp;lt;b&amp;gt;Women in AppSec Panel&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:WiA_400x400.jpg | 50px ]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Short A.V Evasion and Fast Incident Response&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lucian Ilca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | The field of Anti-Virus Evasion and Fast Incident Response, combined with Malware Analysis comprises the art and science of dissecting malicious software using diverse tools like: FLARE, Cuckoo Sandbox or other forensics tools and response immediatly to any type of incident. &lt;br /&gt;
The study and analysis of these tools fall within the general purview of the broad disciplines of Digital Forensics, PSIRT, Cyber Security Operations and general principles of Reverse Engineering. &lt;br /&gt;
In this paper, we explore and discuss the current state of anti-virus evasion, malware analysis and fast incident response, . &lt;br /&gt;
Based on author research, he conclude that the domain of malware analysis, A.V Evasion and Fast Incident Response has effectively been relegated from the academic realm to the domain of the practitioner's skill set. &lt;br /&gt;
For the final presentation, author will show how you can respond to an incident and how to protect your environment for new attacks. &amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.owasp.org/images/5/53/OWASP_CTI_Presentation_Calita_Cristi.pptx Secure your cyber battlefield leveraging cyber threat intelligence]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Cristian Calita&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Cyber crime, Cyber environment, Cyber activities, Cyber security, etc - Cyber is the new black. Therefore cyber threat intelligence (CTI) was expected to arise. &amp;lt;br&amp;gt;&lt;br /&gt;
As web applications are important pieces of the operational environment - at least to the fact that these may be entry points into internal networks, one of the CTI's goals is to keep the defenders (e.g. application security architects, application developers, etc) and stakeholders ahead threats and adversaries by feeding them with the missing piece from their knowledge. The presentation provides details on how this goal could be achieved.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Automating Security Operations using Phantom&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Isabella Minca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Our challenge consists in working with a SIEM which manages over 30 TB of logs per day and over 100 different types of Security Alerts, triggered based on the logs. Challenge accepted! This presentation aims to reveal our efforts towards automating Security Alerts triaging workflow using a Python based tool, Phantom.  We investigate further and decide upon the actions needed in order to remediate the vulnerabilities. A wide range of workflow actions can be automated, such as running searches or scripts that enrich alert data, reporting and proactively resolving security misconfigurations using various app integrations like Exchange, Slack and Jira. While the adoption of such an initiative is not a quick win but a bumpy road, it easily results in translating the day-to-day Security Operations Center work into a highly scalable, automated and tailored approach when it comes to dealing with the threat landscape! As a consequence, the whole organisation is moving towards a world of SecDevOps.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_CTI_Presentation_Calita_Cristi.pptx&amp;diff=244676</id>
		<title>File:OWASP CTI Presentation Calita Cristi.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_CTI_Presentation_Calita_Cristi.pptx&amp;diff=244676"/>
				<updated>2018-10-28T16:15:37Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244675</id>
		<title>OWASP Bucharest AppSec Conference 2018 Agenda Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Agenda_Talks&amp;diff=244675"/>
				<updated>2018-10-28T16:03:37Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda, 26th of October &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | So you think you do security?&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/martin-knobloch/ Martin Knobloch]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Security is hot and we get all the fancy old and new titles: Chief Information Security Officer, Security Archtect, Security Tester, Security Engineer, Security and Risk Auditor! Of course, now the days you are falling behind if you do not have cyber in your title or job description, giving us the possibility of more fancy titles as for exampel 'Cyer security expert'! And we all doing security, right? Really, do you think you 'do security'?  &lt;br /&gt;
As if compliancy has not been complex enough, let's add privacy vs security and don't forgeth moving to cloud and serverless architectures. Do you still think you are in control? Let me lift the smoke screen of cyber security obscurity and show you how to do security right! Getting in control buttom up and top down (is there really a choice), by building alliances, sharing knowledge and deligate responsibilities. Not the least by setting the right examples!&lt;br /&gt;
Let me show you an holistic but practical aproach adding security to your business responsibilityies and development metrics. Get control by let go and enable scalable security for your software factories. How to manage security in traditional waterfall and project centric envirnoments and how to scale in the agile worlds of DevOps and CD/CI!&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Browsers - For better or worse ...&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://pt.linkedin.com/in/simpsonpt Renato Rodrigues]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | It is no news that security is under close scrutiny of the public eye. Everyone is on alert for the latest database leak, closely tracking the updates on the business losing millions on a hack or digging deep into the web to find ways to stay protected. In this presentation, we'll tap into the role browsers play from the security practices perspective - regarding defense and browsers as attack platforms. While some of the tricks covered in this presentation will be recognizable for most in the community, others are still kept away from the limelight. Hopefully, in the end, you will be able to take something new for your assessments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11:30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Access control, REST and sessions&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/johanpeeters Johan Peeters]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |There is a lot of confusion surrounding REST, state, sessions, and the implications for access control. Let’s clear this up. &amp;lt;br&amp;gt;&lt;br /&gt;
REST services are stateless. In other words, there are no sessions between REST API producers and consumers. Given the difficulties of securing sessions, this is A Good Thing from a security perspective. &amp;lt;br&amp;gt;&lt;br /&gt;
Access to REST APIs is incumbent on the presentation of a valid security token. Typically, this is an access token issued by an OAuth authorization server. The authZ server maintains a session with the user agent so that the user does not need to re-authenticate each time a new access token is needed. This is not entirely unproblematic, as will be illustrated through a discussion of logout and the tenuous implementation of silent authentication in client libraries. Conversely, I will argue for leveraging authorization server sessions to raise the consent game to a level where it truly serves the interests of the user.&amp;lt;br&amp;gt;&lt;br /&gt;
In summary, while REST APIs are stateless and do not maintain a session, access control architectures *do* rely on sessions trying to provide a good user experience while enforcing authorization policies.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12:30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |[https://www.owasp.org/images/5/53/20181021_-_Cookies_vs_tokens_-_A_paradoxial_choice_%28AppSec_Bucharest%29_small.pdf Cookies versus tokens: a paradoxical choice]&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/philippederyck/ Philippe De Ryck]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |When you’re building Angular applications, you will need to figure out how to manage your user’s sessions. Back in the days, this used to be simple. But now, there are many different options, all with specific advantages and disadvantages. How can you make a sensible choice, and how will that impact the security of your application?&amp;lt;br&amp;gt;&lt;br /&gt;
This talk lays it out for you. We dive into the technicalities of cookies, JWT tokens and Authorization headers. You will learn how to assess your past choices, and how to substantiate future decisions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(40 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | &amp;lt;b&amp;gt;Women in AppSec Panel&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:WiA_400x400.jpg | 50px ]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Short A.V Evasion and Fast Incident Response&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lucian Ilca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | The field of Anti-Virus Evasion and Fast Incident Response, combined with Malware Analysis comprises the art and science of dissecting malicious software using diverse tools like: FLARE, Cuckoo Sandbox or other forensics tools and response immediatly to any type of incident. &lt;br /&gt;
The study and analysis of these tools fall within the general purview of the broad disciplines of Digital Forensics, PSIRT, Cyber Security Operations and general principles of Reverse Engineering. &lt;br /&gt;
In this paper, we explore and discuss the current state of anti-virus evasion, malware analysis and fast incident response, . &lt;br /&gt;
Based on author research, he conclude that the domain of malware analysis, A.V Evasion and Fast Incident Response has effectively been relegated from the academic realm to the domain of the practitioner's skill set. &lt;br /&gt;
For the final presentation, author will show how you can respond to an incident and how to protect your environment for new attacks. &amp;lt;br&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Secure your cyber battlefield leveraging cyber threat intelligence&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Cristian Calita&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Cyber crime, Cyber environment, Cyber activities, Cyber security, etc - Cyber is the new black. Therefore cyber threat intelligence (CTI) was expected to arise. &amp;lt;br&amp;gt;&lt;br /&gt;
As web applications are important pieces of the operational environment - at least to the fact that these may be entry points into internal networks, one of the CTI's goals is to keep the defenders (e.g. application security architects, application developers, etc) and stakeholders ahead threats and adversaries by feeding them with the missing piece from their knowledge. The presentation provides details on how this goal could be achieved.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Automating Security Operations using Phantom&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Isabella Minca&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Our challenge consists in working with a SIEM which manages over 30 TB of logs per day and over 100 different types of Security Alerts, triggered based on the logs. Challenge accepted! This presentation aims to reveal our efforts towards automating Security Alerts triaging workflow using a Python based tool, Phantom.  We investigate further and decide upon the actions needed in order to remediate the vulnerabilities. A wide range of workflow actions can be automated, such as running searches or scripts that enrich alert data, reporting and proactively resolving security misconfigurations using various app integrations like Exchange, Slack and Jira. While the adoption of such an initiative is not a quick win but a bumpy road, it easily results in translating the day-to-day Security Operations Center work into a highly scalable, automated and tailored approach when it comes to dealing with the threat landscape! As a consequence, the whole organisation is moving towards a world of SecDevOps.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:20181021_-_Cookies_vs_tokens_-_A_paradoxial_choice_(AppSec_Bucharest)_small.pdf&amp;diff=244674</id>
		<title>File:20181021 - Cookies vs tokens - A paradoxial choice (AppSec Bucharest) small.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:20181021_-_Cookies_vs_tokens_-_A_paradoxial_choice_(AppSec_Bucharest)_small.pdf&amp;diff=244674"/>
				<updated>2018-10-28T16:02:28Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Sponsors&amp;diff=244409</id>
		<title>OWASP Bucharest AppSec Conference 2018 Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Sponsors&amp;diff=244409"/>
				<updated>2018-10-22T04:20:15Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;20&amp;quot; border=&amp;quot;0&amp;quot; valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Diamond  Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Fitbit-logo.png|400px|center|link=https://fitbit.com]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Platinum Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Logo CMYK.JPG| 250px|center |link=https://atos.net/ro/romania]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Gold Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Endava Logo CMYK 300dpi-01.jpg| 300px|center |link=www.endava.com]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;CTF and Dinner Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Adobe logoB.png| 100px|center |link=http://www.adobe.com/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Event Supporters&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Infosec-conferences.png|250px|link=https://infosec-conferences.com/]]&lt;br /&gt;
| [[Image:RST.jpg|150px|center|link=https://rstforums.com/]]&lt;br /&gt;
| [[Image:SoftLead.png|200px|link=http://www.softlead.ro/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Codette-logo-300x300.png|200px|link=https://codette.ro]]&lt;br /&gt;
| [[Image:Gwcr.png|200px|center|link=www.girlswhocode.ro]]&lt;br /&gt;
| [[Image:Mindgeek-logo.png |200px|center|link=https://www.mindgeek.com/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:EU-cyberS.jpg|100px|center|link=https://cybersecuritymonth.eu/activities]]&lt;br /&gt;
| [[Image:CERT-RO banner.png|350px|center|link=https://www.cert.ro/]]&lt;br /&gt;
| [[Image:Logoanis.png|200px|center|link=https://www.anis.ro/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Agileworks-logo1.jpg| link=https://agileworks.ro/]]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Workshops&amp;diff=244385</id>
		<title>OWASP Bucharest AppSec Conference 2018 Workshops</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Workshops&amp;diff=244385"/>
				<updated>2018-10-19T10:54:18Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Workshop &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Trainers'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Workshop &amp;lt;br&amp;gt; 25th of October&amp;lt;br&amp;gt; '''3,5 hours:'''&amp;lt;br&amp;gt;begins at 09:00 &amp;lt;br&amp;gt;''' '''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Automating CI Sec - Pipelines using ZAP, Docker and static code analysis&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  [https://uk.linkedin.com/in/spyros-gasteratos-36787049 Spyros Gasteratos ] and [https://uk.linkedin.com/in/nataliya-dubrovska-02b2078b Nataliya Dubrovska]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description:''' In this workshop we will go through customizing ZAP's docker images and some static code analysis scripts to work with Concourse CI so that it automatically tests the deployed web application.&lt;br /&gt;
Moreover we will write an example ZAP orchestration script to better test specific parts of the example application.&amp;lt;br&amp;gt;&lt;br /&gt;
Last, we will create Docker containers of two static code analysis scripts so that we can easily integrate them into the CI pipeline. &amp;lt;br&amp;gt;&lt;br /&gt;
We will go through:&lt;br /&gt;
* Configuring Concourse CI to work with ZAP.&lt;br /&gt;
* Configuring the testing harness to work with ZAP&lt;br /&gt;
* Writing orchestration scripts to better test specific part of the application.&lt;br /&gt;
* Package extra tooling so that we better test the committed codebase&lt;br /&gt;
At the end of the workshop the attendees will have example configuration files, orchestration scripts, rules and Dockerfiles for all tools used.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Intended audience:''' security engineers, developers, pentesters&amp;lt;br&amp;gt;&lt;br /&gt;
'''Skill level:	''' beginner - intermediate&amp;lt;br&amp;gt;&lt;br /&gt;
'''Requirements:''' a laptop with Virtual Box installed&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Seats available:	'''20 (first-come, first served)&amp;lt;br&amp;gt;&lt;br /&gt;
'''Price:	'''free &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2018-tickets-47960216298 Register here]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Workshop &amp;lt;br&amp;gt; 25th of October&amp;lt;br&amp;gt; '''3 hours:'''&amp;lt;br&amp;gt;begins at 13:30 &amp;lt;br&amp;gt;''' '''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OAuth and OpenID Connect best practices&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/johanpeeters Johan Peeters]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description:''' OAuth and OpenID Connect (OIDC) quickly became dominant in the API economy. Was this because they were shiny new toys or are they really superior to older protocols for obtaining authorization and identity information such as SAML? While SAML was designed for the enterprise, OAuth and OIDC’s creation myth is from a different universe: it gives social media users the possibility to delegate limited access to partially trusted clients. Since, OAuth and OIDC have been employed well beyond the confines of social media. Consequently, a good deal of creativity to adapt a protocol designed for Discretionary Access Control (DAC) in a social media context to enterprise Mandatory Access Control (MAC) requirements has been observed - I cannot help feeling the wheel has been reinvented many times over.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this workshop, we discuss some of the design patterns that have come to the fore and reflect on the road ahead. What standard updates can we expect? Should we be compiling best practices? If so, what do they contain?&amp;lt;br&amp;gt;&lt;br /&gt;
Here are some candidate topics for an in-depth discussion:&lt;br /&gt;
* a format for OAuth access tokens&lt;br /&gt;
* principle of least privilege: what does this mean for security tokens?&lt;br /&gt;
* how are permissions represented?&lt;br /&gt;
* how are users granted permissions?&lt;br /&gt;
* how are permissions communicated to resource servers?&lt;br /&gt;
* security token Time To Live&lt;br /&gt;
* access token claims&lt;br /&gt;
'''Intended audience:''' developers, security professionals &amp;lt;br&amp;gt;&lt;br /&gt;
'''Skill level:''' intermediate &amp;lt;br&amp;gt;&lt;br /&gt;
'''Requirements:''' for optimal benefit, participants should have a good knowledge of the OAuth and OIDC frameworks &amp;lt;br&amp;gt;&lt;br /&gt;
'''Seats available:''' 20 (first-come, first served)&amp;lt;br&amp;gt;&lt;br /&gt;
'''Price:	'''free &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2018-tickets-47960216298 Register here]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Sponsors&amp;diff=244354</id>
		<title>OWASP Bucharest AppSec Conference 2018 Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Sponsors&amp;diff=244354"/>
				<updated>2018-10-18T14:18:02Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;20&amp;quot; border=&amp;quot;0&amp;quot; valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Diamond  Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Fitbit-logo.png|400px|center|link=https://fitbit.com]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Platinum Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Logo CMYK.JPG| 250px|center |link=https://atos.net/ro/romania]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Gold Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Endava Logo CMYK 300dpi-01.jpg| 300px|center |link=www.endava.com]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Silver  Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Hackerone-logo.png|350px|center|link=https://www.hackerone.com]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;CTF and Dinner Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Adobe logoB.png| 100px|center |link=http://www.adobe.com/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Event Supporters&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Infosec-conferences.png|250px|link=https://infosec-conferences.com/]]&lt;br /&gt;
| [[Image:RST.jpg|150px|center|link=https://rstforums.com/]]&lt;br /&gt;
| [[Image:SoftLead.png|200px|link=http://www.softlead.ro/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Codette-logo-300x300.png|200px|link=https://codette.ro]]&lt;br /&gt;
| [[Image:Gwcr.png|200px|center|link=www.girlswhocode.ro]]&lt;br /&gt;
| [[Image:Mindgeek-logo.png |200px|center|link=https://www.mindgeek.com/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:EU-cyberS.jpg|100px|center|link=https://cybersecuritymonth.eu/activities]]&lt;br /&gt;
| [[Image:CERT-RO banner.png|350px|center|link=https://www.cert.ro/]]&lt;br /&gt;
| [[Image:Logoanis.png|200px|center|link=https://www.anis.ro/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Agileworks-logo1.jpg| link=https://agileworks.ro/]]&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Team&amp;diff=244280</id>
		<title>OWASP Bucharest AppSec Conference 2018 Team</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Team&amp;diff=244280"/>
				<updated>2018-10-16T09:01:53Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit6&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Organizers''':&lt;br /&gt;
*Oana Cornea [http://ro.linkedin.com/pub/oana-cornea/55/430/b10]&lt;br /&gt;
*Cosmin Marius Ilie [https://ro.linkedin.com/in/iliec]&lt;br /&gt;
*Andreea Druga[https://www.linkedin.com/in/andreea-cristina-drug%C4%83-9ab61090/]&lt;br /&gt;
*Andreea Cutlacai [https://ro.linkedin.com/in/cutlacai-andreea-3117231b]&lt;br /&gt;
*Daniel Barbu [http://ro.linkedin.com/in/barbuionutdaniel?trk=pub-pbmap]&lt;br /&gt;
*Raluca Vasilache [https://ro.linkedin.com/in/rvasilache?trk=pub-pbmap]&lt;br /&gt;
*Vlad Cotenescu [https://ro.linkedin.com/in/vladcotenescu]&lt;br /&gt;
*Alexandra Tautan [https://ro.linkedin.com/in/alexandra-maria-t-36b56544]&lt;br /&gt;
*Uzoma Ogbonna [https://www.linkedin.com/in/uzoma-chigozie-ogbonna-9a908a77]&lt;br /&gt;
&lt;br /&gt;
'''CTF''':&lt;br /&gt;
*Razvan Deaconescu [https://ro.linkedin.com/in/razvandeaconescu]&lt;br /&gt;
*Vali Ghita [https://ro.linkedin.com/in/valighita]&lt;br /&gt;
*Vladimir Diaconescu&lt;br /&gt;
*Ștefania Popescu&lt;br /&gt;
*Alexandra Săndulescu&lt;br /&gt;
* Alexandru Razvan Caciulescu [https://www.linkedin.com/in/alexandru-razvan-caciulescu-049699106/]&lt;br /&gt;
&lt;br /&gt;
'''Photo'''&lt;br /&gt;
*Andreea Druga[https://www.linkedin.com/in/andreea-cristina-drug%C4%83-9ab61090/]&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Training2&amp;diff=244279</id>
		<title>OWASP Bucharest AppSec Conference 2018 Training2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Training2&amp;diff=244279"/>
				<updated>2018-10-16T09:00:37Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;h2&amp;gt;Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; |  '''Time''' &lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Title'''&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainers'''&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 2 days training &amp;lt;br&amp;gt; 24th and 25th of October &amp;lt;br&amp;gt; daily: 9:00 - 17:00&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Advanced Web Hacking and Secure Coding&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://in.linkedin.com/in/vikramsalunke20 Vikram Salunke]&lt;br /&gt;
| colspan=&amp;quot;0&amp;quot; style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Description:''' Web applications are becoming more complex and targets are become more hardened to penetrate. Nowadays Load Balancers, Web Application Firewalls (WAF) are very common in infrastructure. So, as a pentester, we should improve our skills to defeat modern access controls mechanisms. &amp;lt;br&amp;gt;&lt;br /&gt;
This hands-on training covers both offensive and defensive approaches to web applications. You’ll learn how to identify vulnerabilities of web applications, how to execute exploit against that vulnerability, how the attacks works, and how to prevent them in the future. This training closes that gap between web application attack and defense. Because as they say - if you want to stop attacker from stealing you data then you must think like one.&amp;lt;br&amp;gt;&lt;br /&gt;
This training starts with the basic web app hacking and then moves into more advanced stuff such as bypassing Filters, bypassing Web Application Firewalls(WAF), HTML5 attacks and recent vulnerabilities such as Shellshock, Heartbleed, POODLE, Serialization, SSL Strip etc. You’ll learn how to get shell on the box using web application vulnerabilities as well as how to write secure code so you can avoid that attack.&amp;lt;br&amp;gt;&lt;br /&gt;
This training covers both offensive and defensive approach towards web applications. Firstly, the training would cover how to use certain attack on a web application and then how does this attack happened. So it covers where the developer went wrong and how to write secure code, so that the attack would not have happened. It covers various mistakes made by developers who wrote vulnerable code. This training covers how to write secure code in multiple languages such as PHP, Java, C# etc. Lab contains multiple CMS such as Wordpress, Drupal, Joomla and multiple databases such as MySql, SQL Server, MongoDB etc. Also, the training contains various client side attacks as well as server side attacks such as XSS, CSRF, SQL Injections etc. &amp;lt;br&amp;gt;&lt;br /&gt;
Training will teach attendees how to gain shell on the box and how to chain multiple attacks to pwn the entire infrastructure. Training follows Capture The Flag (CTF) approach to attack web applications and compromise the machines. &amp;lt;br&amp;gt;&lt;br /&gt;
After this training, attendees will be able to successfully identify and avoid insecure code and test their web applications for vulnerabilities. Attendees will get to know the difference between vulnerable code and secure code. &amp;lt;br&amp;gt;&lt;br /&gt;
This training contains over 50 labs and 30+ challenges which are inspired by real world vulnerabilities and case studies.  &amp;lt;br&amp;gt;&lt;br /&gt;
Day 1:&lt;br /&gt;
* Introduction&lt;br /&gt;
* Spidering Web Applications and analyzing results&lt;br /&gt;
* Fuzzing&lt;br /&gt;
* Input Validation &lt;br /&gt;
* User Enumeration &lt;br /&gt;
* Bypassing Password Verification &lt;br /&gt;
* Information Leakage &lt;br /&gt;
* HTTP Verb Tampering&lt;br /&gt;
* Injection - HTML, iFrame, LDAP, CSS, JSON &lt;br /&gt;
* Advanced Cross Site Scripting (XSS) - XSS to system compromise&lt;br /&gt;
* Advanced client side exploitation with BeEF&lt;br /&gt;
* Extending Burp Proxy&lt;br /&gt;
* Clickjacking&lt;br /&gt;
* Insecure direct object reference (IDOR) and Open Redirects&lt;br /&gt;
* Server Side Request Forgery (SSRF)&lt;br /&gt;
* Server Side Includes Injection (SSI Injection)&lt;br /&gt;
* JavaScript Validation Bypass&lt;br /&gt;
* Advanced SQL Injection - SQL Injection to system compromise&lt;br /&gt;
* JSON Hijacking &lt;br /&gt;
* Session Management and Cookie Stealing &lt;br /&gt;
* HTML5&lt;br /&gt;
Day 2:&lt;br /&gt;
* Advanced XML Attacks&lt;br /&gt;
* JSON Web Token &lt;br /&gt;
* API Attacks&lt;br /&gt;
* Insecure System/Service configuration - FTP, NTP, VNC, SNMP, WebDav, Samba etc.&lt;br /&gt;
* Database Security - MySql, SQL Server, MongoDB etc.&lt;br /&gt;
* Remote Command Injection&lt;br /&gt;
* Local File Inclusion (LFI) and Remote File Inclusion (RFI) &lt;br /&gt;
* RCE via serialization/deserialization&lt;br /&gt;
* Serialization Attacks &lt;br /&gt;
* HTTP Response Splitting&lt;br /&gt;
* SSL Strip attack&lt;br /&gt;
* CMS Attacks and Defenses - Wordpress, Drupal, Joomla&lt;br /&gt;
* Recent Vulnerabilities Case Study - Shellshock, Heartbleed, POODLE, Struts, PHPMailer RCE, SSL Strip attack&lt;br /&gt;
* Logical Flaws&lt;br /&gt;
* Detection of Web Application Firewall and Load Balancers&lt;br /&gt;
* Filter Evasion and Bypassing Web Application Firewalls (WAF) - Tricks to Penetrate Firewall&lt;br /&gt;
* OWASP Top 10 Attacks&lt;br /&gt;
* OWASP Secure Coding Practices&lt;br /&gt;
* and more ...&lt;br /&gt;
'''Intended audience:''' software developers, security people with some programming experience&amp;lt;br&amp;gt;&lt;br /&gt;
'''This course requires following pre-requisites:'''&lt;br /&gt;
* Basic knowledge on HTTP, HTML&lt;br /&gt;
* Basic Web Application Penetration Skills &lt;br /&gt;
* Reading and understanding of PHP&lt;br /&gt;
'''Seats available:	'''20 (first-come, first served)&amp;lt;br&amp;gt;&lt;br /&gt;
'''Price: 650 Euro / person'''&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2018-tickets-47960216298#tickets Register here]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Team&amp;diff=244260</id>
		<title>OWASP Bucharest AppSec Conference 2018 Team</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Team&amp;diff=244260"/>
				<updated>2018-10-15T19:01:03Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Organizers''':&lt;br /&gt;
*Oana Cornea [http://ro.linkedin.com/pub/oana-cornea/55/430/b10]&lt;br /&gt;
*Cosmin Marius Ilie [https://ro.linkedin.com/in/iliec]&lt;br /&gt;
*Andreea Druga[https://www.linkedin.com/in/andreea-cristina-drug%C4%83-9ab61090/]&lt;br /&gt;
*Daniel Barbu [http://ro.linkedin.com/in/barbuionutdaniel?trk=pub-pbmap]&lt;br /&gt;
*Raluca Vasilache [https://ro.linkedin.com/in/rvasilache?trk=pub-pbmap]&lt;br /&gt;
*Vlad Cotenescu [https://ro.linkedin.com/in/vladcotenescu]&lt;br /&gt;
*Alexandra Tautan [https://ro.linkedin.com/in/alexandra-maria-t-36b56544]&lt;br /&gt;
*Uzoma Ogbonna [https://www.linkedin.com/in/uzoma-chigozie-ogbonna-9a908a77]&lt;br /&gt;
&lt;br /&gt;
'''CTF''':&lt;br /&gt;
*Razvan Deaconescu [https://ro.linkedin.com/in/razvandeaconescu]&lt;br /&gt;
*Vali Ghita [https://ro.linkedin.com/in/valighita]&lt;br /&gt;
*Vladimir Diaconescu&lt;br /&gt;
*Ștefania Popescu&lt;br /&gt;
*Alexandra Săndulescu&lt;br /&gt;
* Alexandru Razvan Caciulescu [https://www.linkedin.com/in/alexandru-razvan-caciulescu-049699106/]&lt;br /&gt;
&lt;br /&gt;
'''Photo'''&lt;br /&gt;
*Andreea Druga[https://www.linkedin.com/in/andreea-cristina-drug%C4%83-9ab61090/]&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Talks&amp;diff=244247</id>
		<title>OWASP Bucharest AppSec Conference 2018 Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Talks&amp;diff=244247"/>
				<updated>2018-10-15T18:03:32Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: edit6&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;h2&amp;gt;Conference agenda, 26th of October &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 8:30 - 9:00&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:00 - 9:15&amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Oana Cornea&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  Introduction to the OWASP Bucharest Event, Schedule for the Day  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:15 - 9:45&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | It's a World of SecDevOps @ OWASP&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://ro.linkedin.com/in/barbuionutdaniel/en Daniel Barbu]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | SecDevOps comes with a built-in security mindset and ideally adopts the proven practices already in use by embedded SRE teams. Day-to-day activities for this role contribute not only to achievement of operational and development goals but also to keeping high levels of confidentiality, integrity and availability. While improving the security posture, the processes become easier to audit and compliance controls better assessed. With product teams engaging with security as early as possible as opposed to the end of the project, the focus shifts from a reactive approach to a proactive one integrating defensive practices through the lifecycle. Consequently the systems’ predictability and understanding of the infrastructure behavior increases. When possible, open security issues should be tracked in the same work tracking system that Development and Operations are using, ensuring visibility and prioritization  against all other work. Infosec being embedded within the product teams, enables informed decisions by gaining business context. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 - 10.30&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Tales of Practical Android Penetration Testing (Mobile Pentest Toolkit)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/alexander-subbotin-11290510a Alexander Subbotin]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | A vast number of open source tools and commercial products has been developed to support the security analysis of mobile apps. It has become a great challenge for a penetration tester to choose suitable or the best tools and the adequate pentest environment/distribution. And even when the test tools have been chosen, the problem remains that most of the tools only offer a CLI interface and that their usage can be very time consuming.&lt;br /&gt;
In order to automatize the setup of the test environment and the common processes during a mobile pentest, the author has developed the &amp;quot;Mobile Pentest Toolkit&amp;quot; (PMT). This toolkit takes over recurring and time consuming tasks for the tester. It has a standardized user interface for the usage of locally installed security tools (and installs them on demand). An example of use is: After the tester has modified the Smali code, the generation of a valid and signed APK file only takes a few moments. Aside from that, this talk illustrates techniques for dynamic analysis and tracking of changes within the app. The goal is to present the Mobile Pentest Toolkit to an interested audience and to publish it as an open source tool. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45 - 11.30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Breaking the Apple iOS Sandbox&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://ro.linkedin.com/in/razvandeaconescu Razvan Deaconescu]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | Apple iOS uses sandboxing to confine apps to certain calls they can make to services and the kernel. Apps are attached a sandbox profile: a set of rules that allow or deny actions. All 3rd party apps (i.e. downloaded from the AppStore) use the same sandbox profile (container). Sandbox profiles are stored as binary blobs in the iOS kernel. &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, I will highlight the way iOS sandboxing works and steps we undertook in reversing binary blobs. We then analyzed reversed human-readable sandbox profiles and found misconfigurations in the profiles that allowed crippling the system from a valid app. We let Apple know of our findings, now published as CVEs.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45 - 12.30&amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Evading your protection and exfiltrate data&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://www.linkedin.com/in/cosminradu13 Cosmin Alexandru Radu]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |Evading your protection and exfiltrate data&lt;br /&gt;
This presentation is meant to be an introduction into a number of ex-filtration techniques that are out there, used by malicious attackers. It should be a view into the attackers toolset for developers and how they can counteract the issues attackers use to get data out of their applications, or how system administrators can guard their network against egress data leakage.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 - 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; |Lunch/Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 - 14:15&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Top 10 with .NET Core&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://ro.linkedin.com/in/ignatandrei Andrei Ignat]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | We will show OWASP Top 10 and how to counter them in .NET Core&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:20 - 15:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | AWS VMS&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | [https://ro.linkedin.com/in/gabriel-pilat-3053229b Gabriel Pilat]&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; | This presentation looks at how Vulnerability Management is generally performed (Scanning, Asset management, Reporting, TI etc. ), how it can be performed in the Amazon Cloud ( Deploy scanners, Use Integrated scanner, etc), the possibilities of automation Amazon offers and ways to integrate it with 3rd party tools such as Qualys. General AWS architecture, security services and benefits, inherited security flaws, issues and limitations encountered. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:05 - 15:20&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:20 - 16:05&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Protecting company information for GDPR compliance. A software architect’s perspective.&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Ovidiu Ariton&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |For years cybersecurity has been approached at the network level and at endpoint level. Best practices are good but sometimes user behavior makes the difference between a compromised system and a safe one. Most of the times they don’t understand if something went wrong. What if they knew? &amp;lt;br&amp;gt;&lt;br /&gt;
The solution that I am going to present brings the tools available in a SOC to the user level, at the endpoint. It combines some of the best practices in security (like backup and DLP) with SOAR solutions and LRA in order to prevent loss of data and ensure rapid automated reaction to cybersecurity incidents.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:05 - 16:50&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | DevSecOps Use Case: Automate Early… But Securely&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Serban Bejan&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; colspan=&amp;quot;0&amp;quot; |In today’s increasingly digitalized world, the need for security in DevOps is met by a new concept, called DevSecOps. Aimed at creating and including modern security practices that can be incorporated into the fast and agile world of DevOps, DevSecOps is, in fact, an extension of DevOps’ main goal. &amp;lt;br&amp;gt; &lt;br /&gt;
In our use case we studied the possible benefits and challenges of integrating SAST and DAST tools into the existing toolchain (application lifecycle manager, IDE, source code management tool and continuous integration pipeline) for developing, deploying and testing a Java web application.&amp;lt;br&amp;gt;&lt;br /&gt;
Implementing DevSecOps brings a lot of value to organizations, it also comes with some challenges, like integrating more agile security methods and properly training users for using these advanced tools. Last but not least, we also need to take into consideration that any security functionality not automated in the available tools will result in creating friction in the cycle.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:50 - 17:00&amp;lt;br&amp;gt;(15 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Closing ceremony&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | OWASP Bucharest team&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  CTF Prizes&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Sponsors&amp;diff=244244</id>
		<title>OWASP Bucharest AppSec Conference 2018 Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Bucharest_AppSec_Conference_2018_Sponsors&amp;diff=244244"/>
				<updated>2018-10-15T14:22:00Z</updated>
		
		<summary type="html">&lt;p&gt;Oana Cornea: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;20&amp;quot; border=&amp;quot;0&amp;quot; valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Diamond  Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Fitbit-logo.png|400px|center|link=https://fitbit.com]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Platinum Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Logo CMYK.JPG| 250px|center |link=https://atos.net/ro/romania]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Gold Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Endava Logo CMYK 300dpi-01.jpg| 300px|center |link=www.endava.com]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-  &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Silver  Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Hackerone-logo.png|350px|center|link=https://www.hackerone.com]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;CTF and Dinner Sponsor&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Adobe logoB.png| 100px|center |link=http://www.adobe.com/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;lt;h2&amp;gt;Event Supporters&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Infosec-conferences.png|250px|link=https://infosec-conferences.com/]]&lt;br /&gt;
| [[Image:RST.jpg|150px|center|link=https://rstforums.com/]]&lt;br /&gt;
| [[Image:SoftLead.png|200px|link=http://www.softlead.ro/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:Codette-logo-300x300.png|200px|link=https://codette.ro]]&lt;br /&gt;
| [[Image:Gwcr.png|200px|center|link=www.girlswhocode.ro]]&lt;br /&gt;
| [[Image:Mindgeek-logo.png |200px|center|link=https://www.mindgeek.com/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| [[Image:EU-cyberS.jpg|100px|center|link=https://cybersecuritymonth.eu/activities]]&lt;br /&gt;
| [[Image:CERT-RO banner.png|350px|center|link=https://www.cert.ro/]]&lt;br /&gt;
| [[Image:Logoanis.png|200px|center|link=https://www.anis.ro/]]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oana Cornea</name></author>	</entry>

	</feed>