<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Owen+Pendlebury</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Owen+Pendlebury"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Owen_Pendlebury"/>
		<updated>2026-05-01T21:07:30Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Board&amp;diff=256011</id>
		<title>Board</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Board&amp;diff=256011"/>
				<updated>2019-11-10T19:35:14Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= Board Meetings =&lt;br /&gt;
[https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Bylaws] are the most important legal document of any organization. Bylaws outline in writing the day-to-day rules for your organization and provide comprehensive guidelines to keep things running smoothly. If you want to understand the business of OWASP Foundation the best way to do that would be to examine the bylaws the the [https://www.owasp.org/index.php/About_OWASP#Form_990_Documents 990 forms filed with the United States Government as a non-profit annually.]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Global Bylaws]&lt;br /&gt;
&lt;br /&gt;
== Upcoming 2019 Meetings ==&lt;br /&gt;
* [[November 2019 |November 19, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=11&amp;amp;day=18&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
* [[December 2019 |December 17, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=12&amp;amp;day=23&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
All board meeting notes that include actions as a result will be tracked in a single document for all meetings [https://docs.google.com/a/owasp.org/document/d/1aPmftVZH3-G96J6-wrpynwwZhBHtREe5a7g8owVYUag/edit?usp=sharing click here]&lt;br /&gt;
&lt;br /&gt;
== 2018 Elected by Membership, Global Board Members == &lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Member, Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History Historical Board Members by Year]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:Knoblochmartin | Martin Knobloch]]:  Chair  ====&lt;br /&gt;
&lt;br /&gt;
The Chairman of the Board shall serve as the principal executive officer of the Foundation.&lt;br /&gt;
&lt;br /&gt;
Fiduciary responsibilities: He/She shall, in general, supervise and control all of the business and affairs of the Foundation. He/She will monitor financial planning and financial reports He/She or he may sign, with the Secretary or any other proper officer of the Foundation thereunto authorized by the Board of Directors, any deeds, mortgages, bonds, contracts, or other instruments which the Board of Directors has authorized to be executed, except in cases where the signing and execution thereof shall be expressly delegated by the Board of Directors or by these Bylaws to some other officer or agent of the Foundation, or shall be required by law to be otherwise signed or executed;&lt;br /&gt;
&lt;br /&gt;
Leadership and Direction: provides leadership to the Board of Directors with regards to policy setting and strategic planning. He/She helps guide and mediate board actions with respect to organizational priorities and governance concerns, and in general shall perform all duties incident to the office of Chairman of the Board subject to the control of the Board of Directors.&lt;br /&gt;
&lt;br /&gt;
Organizational Responsibilities: He/She plays a leading role in fundraising activities, formally evaluate the performance of the Foundation Director and informally evaluate the effectiveness of the board members. An annual, overall evaluation of the performance of the organization in achieving its mission will be accomplished. He or she shall, when present, preside at all meetings of the Board of Directors, unless otherwise delegated, and such other duties as may be prescribed by the Board of Directors from time to time. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====  [[Owen_Pendlebury_2017_Bio_%26_Why_Me%3F | Owen Pendlebury]]:  Vice Chair ====&lt;br /&gt;
&lt;br /&gt;
Performs Chair responsibilities when the Chair cannot be available, works closely with Chair and other Board Members, participates closely with Chair to develop and implement officer transition plans, performs other responsibilities as assigned by the Board.&lt;br /&gt;
­&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[Sherif_Mansour_2017_Bio_%26_Why_Me%3F | Sherif Mansour]]: Treasurer==== &lt;br /&gt;
&lt;br /&gt;
Treasurer ­manages finances of the organization, administers fiscal matters of the organization, provides annual budget to the board for member’s approval, ensures development and board review of financial policies and procedures. [[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:Ofer_Maor | Ofer Maor]]: Secretary ====&lt;br /&gt;
&lt;br /&gt;
Maintains records of the board and ensures effective management of organization’s records, manages minutes of board meetings, ensures minutes are distributed shortly after each meeting, is sufficiently familiar with legal documents (articles, by­laws, IRS letters, etc.) to note applicability during meetings; is the custodian of the corporate records and of the seal of the Foundation and see that the seal of the Foundation is affixed to all documents, the execution of which on behalf of the Foundation under its seal is duly authorized; keeps a register of the post office address of each Director which shall be furnished to the Secretary by such Director; and, in general perform all duties incident to the office of the Secretary and such other duties as from time to time may be assigned to him by the Chairman of the Board or by the Board. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[Chenxi_Wang,_Ph.D._(Forrester_Research) | Chenxi Wang, Ph.D.]]:  Member at Large====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&lt;br /&gt;
==== [[User:Richard_greenberg | Richard Greenberg]]:  Member at Large ====&lt;br /&gt;
&amp;lt;br&amp;gt;Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====[[Gary_Robinson_2018_Bio_and_Why_me | Gary Robinson]]:  Member at Large ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Meetings Operate =&lt;br /&gt;
'''CALL TO ORDER'''&lt;br /&gt;
&lt;br /&gt;
The first order of business is for the chair to announce the call to order, along with the time. The secretary enters the time of the call to order in the minutes. After the meeting is called to order, the board chair may make welcoming remarks, ask for introductions, or read the organization’s mission and vision statements.&lt;br /&gt;
&lt;br /&gt;
'''CHANGES TO THE AGENDA'''&lt;br /&gt;
&lt;br /&gt;
The second order of business is for the chair to ask for changes to the agenda. Additions and deletions to the agenda will be made at this time. Having no changes, the agenda moves to approving the prior meeting’s minutes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''APPROVAL OF MINUTES'''&lt;br /&gt;
&lt;br /&gt;
The third item on the agenda should list “Approval of Minutes” along with the date of the most recent meeting. In most cases, board members should have received a copy of the minutes prior to the meeting. If they have not contacted the secretary prior to the meeting with corrections or changes to the minutes, they have to opportunity to make them during this item on the agenda.&lt;br /&gt;
&lt;br /&gt;
Board members have an ethical and legal responsibility to make sure that the recording of the minutes accurately reflect the board’s business.&lt;br /&gt;
&lt;br /&gt;
'''REPORTS'''&lt;br /&gt;
&lt;br /&gt;
The fourth item on the agenda is the reports. This first report should be a report from the Executive Director. This report should include a review of operations and projects. The Executive Director should give board members on overview of the business outlook including positive and negative trends, major initiatives, business updates, and other aspects of the business.&lt;br /&gt;
&lt;br /&gt;
Following the Executive Director report, the Finance Director gives a report. Board members should make an effort to understand the financial reports so that they can identify potential financial threats. Understanding financial reports may also generate discussion about potential opportunities.&lt;br /&gt;
&lt;br /&gt;
Subsequent reports may be given by committee chairs.&lt;br /&gt;
&lt;br /&gt;
'''OLD BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Items should include past business items that are unresolved, need further discussion, or require a board vote. Items may be tabled or referred to committee for further exploration.&lt;br /&gt;
&lt;br /&gt;
'''NEW BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Board members should have a discussion about new business items and identify a plan to take action. This may include tabling them, delaying action to a future date, or referring them to a committee.&lt;br /&gt;
&lt;br /&gt;
'''COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
At this point in the agenda, members may make announcements, such as offering congratulations or condolences, or make other special announcements. Any other business may be brought up at this time, for example, items that may need to be added to the next meeting’s agenda.&lt;br /&gt;
&lt;br /&gt;
'''ADJOURNMENT'''&lt;br /&gt;
&lt;br /&gt;
This is a formal closing of the meeting by the board chair. He should state the time that the meeting closed, so that the secretary may including it in the board minutes. The date of the next meeting should follow the adjournment item, so that board members will be reminded to put it on their calendars.&lt;br /&gt;
&lt;br /&gt;
For more information about the Roberts Rules of Order see this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
= Voting History =&lt;br /&gt;
&lt;br /&gt;
=== Historical Votes on Motions ===&lt;br /&gt;
The purpose of this is to track the position on each motion as presented and how the elected official voted on the motion. This is useful for the membership to review how elected officials voted on items that effect the organization and its [https://www.owasp.org/index.php/OWASP_Foundation_ByLaws bylaws]. A motion is a request for action (budget requests, policy changes, new partnerships etc.) they can be presented by ANYONE to the board such as a member of the public, a member of the OWASP Foundation but does require a sponsor on the Board.  That sponsor will present the motion to the board at least (10) working days in advance so it can be read in advance of the meeting.  If appropriate a motion can be presented based to take action on the motion as written. For a vote to be called and action to be taken a second board member is required to carry the business to vote. On completion of the discussion the chairman will call for a vote to the motion YES, NO, ABSTAIN. For more details on this process try this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/OWASP_Board_Votes Historical Board Votes]&lt;br /&gt;
&lt;br /&gt;
Note that if a motion is presented and is voted on and it is approved action will be taken to implement the motion.  If the motion fails it can be resubmitted and the process starts again as if it is a new motion.&lt;br /&gt;
&lt;br /&gt;
=== Attendance Tracker===&lt;br /&gt;
This is used to keep track that Board Members meet 75% attendance requirements as noted in section 3.03 of the organization bylaws. A meeting is logged as attended if the board member attends the entire meeting as scheduled from the call to order until it is adjourned, this includes executive session if applicable that is closed to the membership and general public for reasons related to human resources and legal issues that require it by law or for the good of the OWASP Foundation Inc. - &lt;br /&gt;
 [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracker]&lt;br /&gt;
&lt;br /&gt;
= Historical Meeting Archive =&lt;br /&gt;
== Archive 2019 ==&lt;br /&gt;
* [[October 2019|October 15, 2019]]11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=10&amp;amp;day=21&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[September 2019 |September 25, 2019]] 7 PM The Netherlands CET - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=9&amp;amp;day=25&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=179&amp;amp;p3=137 other time zones]&lt;br /&gt;
* &amp;lt;s&amp;gt;[[August 2019 |August 20, 2019]] 11 AM US Pacific&amp;lt;/s&amp;gt; - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=8&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones] '''CANCELLED'''* [[July 2019 |July 16, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=7&amp;amp;day=15&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[June 2019 |June 18,  2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=6&amp;amp;day=17&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[May 2019 |May 21, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=5&amp;amp;day=20&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[April 2019 |April 29, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=4&amp;amp;day=15&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[March 2019 |March 18,  2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=3&amp;amp;day=18&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[February 2019 |February 18, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=2&amp;amp;day=18&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp; other time zones]&lt;br /&gt;
* [[January 2019 |January 23rd, 2019]] - 3:00 PM to 4:00 PM PST([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=1&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
&lt;br /&gt;
== Archive 2018 ==&lt;br /&gt;
* [[December 2018 |December 19th, 2018]] - 1:00 PM to 2:30 PM EST ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=12&amp;amp;day=19&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
* [[November 2018 |November 21, 2018]] - 12:00 PM to 1:30 PM EST ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=11&amp;amp;day=21&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
* [[October 2018 |October 10, 2018]] - 3:00 to 4:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=10&amp;amp;day=10&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) at AppSec USA 2018 Conference&lt;br /&gt;
* [[September 2018 |September 27, 2018]] - 2:00 PM to 3:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=9&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) &lt;br /&gt;
* [[August 2018 |August 15, 2018]] - 1:00 PM to 2:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=8&amp;amp;day=15&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) &lt;br /&gt;
* [[July 4th, 2018|July 4th, 2018]] - during AppSec EU 2018&lt;br /&gt;
* [[June_19,_2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=6&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 Click Here for Meeting Time in Your Timezone]&lt;br /&gt;
* [[May 15, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=5&amp;amp;day=15&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 Click Here for Meeting Time in Your Timezone]&lt;br /&gt;
* [[April 4, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=4&amp;amp;day=4&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 TimeZone Converter]&lt;br /&gt;
* [[March 7, 2018]] - 3:00pm - 4:00pm EST - [https://www.timeanddate.com/worldclock/converted.html?iso=20180307T21&amp;amp;p1=16&amp;amp;p2=16&amp;amp;p3=676&amp;amp;p4=136&amp;amp;p5=78&amp;amp;p6=179&amp;amp;p7=224&amp;amp;p8=240&amp;amp;p9=102 Time Converter]&lt;br /&gt;
* [[February 7, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=2&amp;amp;day=7&amp;amp;hour=20&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=179&amp;amp;p3=78&amp;amp;p4=102&amp;amp;p5=224&amp;amp;p6=136&amp;amp;p7=152&amp;amp;p8=676 TimeZone Converter]&lt;br /&gt;
* [[January 24, 2018]], [https://www.timeanddate.com/worldclock/fixedtime.html?msg=OWASP+Board+Meeting%2C+January+24+2018&amp;amp;iso=20180124T19&amp;amp;p1=16&amp;amp;ah=1&amp;amp;am=30 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive 2017 ==&lt;br /&gt;
* [[December 6, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=12&amp;amp;day=06&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2017]], 07:00-08:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=11&amp;amp;day=8&amp;amp;hour=15&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[October 11, 2017]],  15:00 - 17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 19, 2017]] 15:00-17:30 PDT, in Orlando at AppSecUSA - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=9&amp;amp;day=19&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 6, 2017]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=09&amp;amp;day=06&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] (Cancelled for interviews)&lt;br /&gt;
*[[August 9, 2017]], 16:00-17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=08&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[July 5, 2017]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=07&amp;amp;day=05&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[June 7, 2017]], 18:00-21:00 CEST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=06&amp;amp;day=07&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[May 9, 2017]],  18:00-19:30 IST, in Belfast at AppSecEU - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=5&amp;amp;day=9&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[April 12, 2017]], 16:00-17:00 PDT - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=04&amp;amp;day=12&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]  ('''Cancelled''' [http://lists.owasp.org/pipermail/owasp-board/2017-April/017969.html Notice by Matt Konda])&lt;br /&gt;
*[[March 22, 2017]] 06:00-07:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=3&amp;amp;day=22&amp;amp;hour=13&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] - *Special Meeting to approve the 2017 Budget*&lt;br /&gt;
* [[March 8, 2017]], 06:00-07:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=03&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 8, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=02&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 11, 2017]], 14:00-15:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=1&amp;amp;day=10&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2016 Meetings ==&lt;br /&gt;
* [[December 14, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=12&amp;amp;day=14&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* CANCELLED - [[November 30, 2016]], 15:00-16:30 PST - placeholder only optional if needed - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=30&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[October 11, 2016]], at AppSecUSA 18:00 - 21:00 EDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[September 21, 2016]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=09&amp;amp;day=21&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[August 23, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=08&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 1, 2016]], 18:00-21:00 CEST, in Rome at AppSecEU - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=01&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 27, 2016]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=27&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[May 18, 2016]],  07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=05&amp;amp;day=18&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[April 20, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=04&amp;amp;day=20&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[March 16, 2016]], 16:00-17:00 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=03&amp;amp;day=16&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 17, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=02&amp;amp;day=17&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 13, 2016]], 16:00-17:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=01&amp;amp;day=14&amp;amp;hour=00&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2015 Meetings ==&lt;br /&gt;
* [[December 9, 2015]], 15:00-17:00 PST &lt;br /&gt;
* [[November 18, 2015]], 14:00-15:30 PST&lt;br /&gt;
* [[November 4, 2015]], 12:00-13:30 PST&lt;br /&gt;
* [[October 14, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[September 25, 2015]] at AppSecUSA 18:00 - 20:00 PST&lt;br /&gt;
* [[August 12, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[July 22, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[June 24, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[May 22, 2015]],  18:00-20:00 CEST in Amsterdam @ AppSec-EU , 9:00am-11:00am PST;&lt;br /&gt;
* [[April 29, 2015]], 12:00-13:00 PST&lt;br /&gt;
* [[March 25, 2015]], 12:00-13:00 PST &lt;br /&gt;
* [[February 11, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[January 14, 2015]], 9am-10am PST&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive for 2014 Meetings ==&lt;br /&gt;
* [[December 10, 2014]], 9am-10am PST&lt;br /&gt;
* [[November 12, 2014]], 9am - 10am PST&lt;br /&gt;
* [[October 8, 2014]], 9am-10am PST&lt;br /&gt;
* [[September 16, 2014]], 6pm - 9pm MST, In person at Appsec USA &lt;br /&gt;
* [[August 13, 2014]], 9am-10am PST&lt;br /&gt;
* [[July 9, 2014]], 9am-10am PST&lt;br /&gt;
* [[June 27, 2014]], 8am - 4 pm BST, In person at AppSec Europe&lt;br /&gt;
* [[April 30, 2014]],9am - 12pm PST&lt;br /&gt;
* [[March 3, 2014]], 7am - 10am PST&lt;br /&gt;
* [[February 24, 2014]], 8am - 10am PST&lt;br /&gt;
&lt;br /&gt;
== Archive for 2013 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[December 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
* December 2, 2013 - Special Board Meeting - [https://docs.google.com/spreadsheet/ccc?key=0ApZ9zE0hx0LNdGdJZ1BIaEZkc2V1QV81NmJ4dnI0R1E&amp;amp;usp=sharing 2014 Budget] walk through, Q &amp;amp; A (no meeting notes)&lt;br /&gt;
&lt;br /&gt;
*[[November 22, 2013]] - In person meeting at AppSec USA - New York, NY&lt;br /&gt;
&lt;br /&gt;
* November 11, 2013 - cancelled due to in person meeting on Nov. 22&lt;br /&gt;
&lt;br /&gt;
*[[October 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[September 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[In person meeting at AppSec EU - Hamburg, Germany; August 19-24]]&lt;br /&gt;
&lt;br /&gt;
* August 12, 2013 - canceled due to in person meeting on Aug 19&lt;br /&gt;
&lt;br /&gt;
*[[July 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[June 10, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 31, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 13, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[April 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[March 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[February 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[January 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2012 Meetings ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation [https://www.owasp.org/images/a/ae/2012ByLawsFINAL.pdf ByLaws]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Global_Committee_Pages Global Committees] &lt;br /&gt;
&lt;br /&gt;
*[[January 9, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 6, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 15, 2012]] &lt;br /&gt;
&lt;br /&gt;
*[[March 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[April 5, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[May 14,2012]]&lt;br /&gt;
&lt;br /&gt;
*[[June 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Aug 13, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Sept 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 8, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 24, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 26, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
*[[Dec 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Dec 27, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
== Archive for 2011 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[March 7, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[April_4_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[May_2_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[June 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[August 8, 2011]] &lt;br /&gt;
&lt;br /&gt;
*[[September 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 20, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 22, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[October 10, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[November 14, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[December 5, 2011]]&lt;br /&gt;
&lt;br /&gt;
== Minutes for 2011 Meetings ==  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Votes Historical]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[Minutes January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes March 8, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 4, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 2, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VD9ZHEwht9tmM8FKEQ6DBrtmL_gTAhSSnQhiFXYkJ7I/edit?hl=en_US&amp;amp;authkey=CIavkP4B June 6 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VMwYrP6owtZ-SchBxUcWTIF-ITvzUX8PjUkLPwr2ipg/edit?hl=en_US&amp;amp;authkey=CIGTx5sD July 11 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1CLu9aQpS7LdeX87rJ5N9cuJ-RGGVzDWf34l6gdMml7M/edit?hl=en_US&amp;amp;authkey=CI-U5qEP August 8, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1HM32VcvWb0hizD5_mhWMULLaouzuRgA3ZYjODRZwyAs/edit?hl=en_US September 6, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1Y-8tZisUZM5ZKP8AxJqvkiNtFanVFM0m--bMG2PZ3ww/edit October 10, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/13-aHX2pSUXjCP8ivsbls6u1VX1BVSYewyMUH8LI7zpQ/edit November 14, 2011]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2010 Meetings ==&lt;br /&gt;
*[[January 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[February 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]] &amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;Postponed until March 9, 2010&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[[April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[May 4, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[August 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[September 8, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[December_6_2010]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2010 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[Jan 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Feb 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes_December_6,_2010]]&lt;br /&gt;
&lt;br /&gt;
*[[OWASP Board Meetings January Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings February Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June 09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting July 7, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting August 4, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting September 1, 2009 Agenda]] &lt;br /&gt;
*[[OWASP Board Meeting October 6, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting November 10, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting December 1, 2009 Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2009 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 01-06-09]]&lt;br /&gt;
* [[OWASP Board Meetings 02-03-09]]&lt;br /&gt;
* [[OWASP Board Meetings 03-10-09]]&lt;br /&gt;
* [[OWASP Board Meetings April 09]]&lt;br /&gt;
* [[OWASP Board Meetings May 09]]&lt;br /&gt;
* [[OWASP Board Meetings June 09]]&lt;br /&gt;
* [[OWASP Board Meeting July 09]]&lt;br /&gt;
* [[OWASP Board Meeting August 09]]&lt;br /&gt;
* [[OWASP Board Meeting September 09]]&lt;br /&gt;
* [[OWASP Board Meeting October 09]]&lt;br /&gt;
* [[OWASP Board Meeting December 09]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2008 Meetings ==&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings July Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings August Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings September Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings October Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings December Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2008 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 2-7-08]]&lt;br /&gt;
* [[OWASP Board Meetings 3-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 5-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 6-3-08]]&lt;br /&gt;
* [[OWASP Board Meetings 8-14-08]]&lt;br /&gt;
* [[OWASP Board Meetings 9-2-08]] &lt;br /&gt;
* [[Owasp Board Meetings 10-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 11-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 12-02-08]]&lt;br /&gt;
&lt;br /&gt;
= Board Election Archive =&lt;br /&gt;
&lt;br /&gt;
All elected officers are required to [https://docs.google.com/document/d/10zBT6oY2Q3B6kr6r7DGl3Cc0f5rGmQ0Slc6RYvbxmus/edit review sign and return] the following document before starting their term in office to the then current board Secretary &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History OWASP Board History]&lt;br /&gt;
&lt;br /&gt;
===2017 Election===&lt;br /&gt;
[https://www.owasp.org/index.php/2017_Global_Board_of_Directors_Election 2017 Board Election]&lt;br /&gt;
=== 2016 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2016_Global_Board_of_Directors_Election 2016 Board Election]&lt;br /&gt;
=== 2015 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2015_Global_Board_of_Directors_Election 2015 Board Election]&lt;br /&gt;
=== 2014 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2014_Board_Elections 2014 Board Election]&lt;br /&gt;
=== 2013 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2013_Board_Elections 2013 Board Election]&lt;br /&gt;
=== 2012 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2012_Election 2012 Board Election]&lt;br /&gt;
=== 2011 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2011Election 2011 Board Election]&lt;br /&gt;
=== 2009 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Board_Election_2009 2009 Board Election]&lt;br /&gt;
&lt;br /&gt;
=== Past OWASP Boards ===&lt;br /&gt;
&lt;br /&gt;
[[Board-2018]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2017]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2016]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2015]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2014]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2013]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2012]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2011]]&lt;br /&gt;
&lt;br /&gt;
= Misc. =&lt;br /&gt;
&lt;br /&gt;
* Teleconference Information: **CHECK MEETING INFORMATION**&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/International_Toll_Free_Calling_Information International Toll Free Calling Info]&lt;br /&gt;
&lt;br /&gt;
* Meeting Template found [https://www.owasp.org/index.php/Board-Meeting-template here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt; &amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Board&amp;diff=256010</id>
		<title>Board</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Board&amp;diff=256010"/>
				<updated>2019-11-10T19:33:06Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= Board Meetings =&lt;br /&gt;
[https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Bylaws] are the most important legal document of any organization. Bylaws outline in writing the day-to-day rules for your organization and provide comprehensive guidelines to keep things running smoothly. If you want to understand the business of OWASP Foundation the best way to do that would be to examine the bylaws the the [https://www.owasp.org/index.php/About_OWASP#Form_990_Documents 990 forms filed with the United States Government as a non-profit annually.]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Global Bylaws]&lt;br /&gt;
&lt;br /&gt;
== Upcoming 2019 Meetings ==&lt;br /&gt;
* [[November 2019 |November 19, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=11&amp;amp;day=18&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
* [[December 2019 |December 17, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=12&amp;amp;day=23&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
All board meeting notes that include actions as a result will be tracked in a single document for all meetings [https://docs.google.com/a/owasp.org/document/d/1aPmftVZH3-G96J6-wrpynwwZhBHtREe5a7g8owVYUag/edit?usp=sharing click here]&lt;br /&gt;
&lt;br /&gt;
== 2018 Elected by Membership, Global Board Members == &lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Member, Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History Historical Board Members by Year]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:Knoblochmartin | Martin Knobloch]]:  Chair  ====&lt;br /&gt;
&lt;br /&gt;
The Chairman of the Board shall serve as the principal executive officer of the Foundation.&lt;br /&gt;
&lt;br /&gt;
Fiduciary responsibilities: He/She shall, in general, supervise and control all of the business and affairs of the Foundation. He/She will monitor financial planning and financial reports He/She or he may sign, with the Secretary or any other proper officer of the Foundation thereunto authorized by the Board of Directors, any deeds, mortgages, bonds, contracts, or other instruments which the Board of Directors has authorized to be executed, except in cases where the signing and execution thereof shall be expressly delegated by the Board of Directors or by these Bylaws to some other officer or agent of the Foundation, or shall be required by law to be otherwise signed or executed;&lt;br /&gt;
&lt;br /&gt;
Leadership and Direction: provides leadership to the Board of Directors with regards to policy setting and strategic planning. He/She helps guide and mediate board actions with respect to organizational priorities and governance concerns, and in general shall perform all duties incident to the office of Chairman of the Board subject to the control of the Board of Directors.&lt;br /&gt;
&lt;br /&gt;
Organizational Responsibilities: He/She plays a leading role in fundraising activities, formally evaluate the performance of the Foundation Director and informally evaluate the effectiveness of the board members. An annual, overall evaluation of the performance of the organization in achieving its mission will be accomplished. He or she shall, when present, preside at all meetings of the Board of Directors, unless otherwise delegated, and such other duties as may be prescribed by the Board of Directors from time to time. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====  [[Owen_Pendlebury_2017_Bio_%26_Why_Me%3F | Owen Pendlebury]]:  Vice Chair ====&lt;br /&gt;
&lt;br /&gt;
Performs Chair responsibilities when the Chair cannot be available, works closely with Chair and other Board Members, participates closely with Chair to develop and implement officer transition plans, performs other responsibilities as assigned by the Board.&lt;br /&gt;
­&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[Sherif_Mansour_2017_Bio_%26_Why_Me%3F | Sherif Mansour]]: Treasurer==== &lt;br /&gt;
&lt;br /&gt;
Treasurer ­manages finances of the organization, administers fiscal matters of the organization, provides annual budget to the board for member’s approval, ensures development and board review of financial policies and procedures. [[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:Ofer_Maor | Ofer Maor]]: Secretary ====&lt;br /&gt;
&lt;br /&gt;
Maintains records of the board and ensures effective management of organization’s records, manages minutes of board meetings, ensures minutes are distributed shortly after each meeting, is sufficiently familiar with legal documents (articles, by­laws, IRS letters, etc.) to note applicability during meetings; is the custodian of the corporate records and of the seal of the Foundation and see that the seal of the Foundation is affixed to all documents, the execution of which on behalf of the Foundation under its seal is duly authorized; keeps a register of the post office address of each Director which shall be furnished to the Secretary by such Director; and, in general perform all duties incident to the office of the Secretary and such other duties as from time to time may be assigned to him by the Chairman of the Board or by the Board. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[Chenxi_Wang,_Ph.D._(Forrester_Research) | Chenxi Wang, Ph.D.]]:  Member at Large====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&lt;br /&gt;
==== [[User:Richard_greenberg | Richard Greenberg]]:  Member at Large ====&lt;br /&gt;
&amp;lt;br&amp;gt;Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====[[Gary_Robinson_2018_Bio_and_Why_me | Gary Robinson]]:  Member at Large ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Meetings Operate =&lt;br /&gt;
'''CALL TO ORDER'''&lt;br /&gt;
&lt;br /&gt;
The first order of business is for the chair to announce the call to order, along with the time. The secretary enters the time of the call to order in the minutes. After the meeting is called to order, the board chair may make welcoming remarks, ask for introductions, or read the organization’s mission and vision statements.&lt;br /&gt;
&lt;br /&gt;
'''CHANGES TO THE AGENDA'''&lt;br /&gt;
&lt;br /&gt;
The second order of business is for the chair to ask for changes to the agenda. Additions and deletions to the agenda will be made at this time. Having no changes, the agenda moves to approving the prior meeting’s minutes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''APPROVAL OF MINUTES'''&lt;br /&gt;
&lt;br /&gt;
The third item on the agenda should list “Approval of Minutes” along with the date of the most recent meeting. In most cases, board members should have received a copy of the minutes prior to the meeting. If they have not contacted the secretary prior to the meeting with corrections or changes to the minutes, they have to opportunity to make them during this item on the agenda.&lt;br /&gt;
&lt;br /&gt;
Board members have an ethical and legal responsibility to make sure that the recording of the minutes accurately reflect the board’s business.&lt;br /&gt;
&lt;br /&gt;
'''REPORTS'''&lt;br /&gt;
&lt;br /&gt;
The fourth item on the agenda is the reports. This first report should be a report from the Executive Director. This report should include a review of operations and projects. The Executive Director should give board members on overview of the business outlook including positive and negative trends, major initiatives, business updates, and other aspects of the business.&lt;br /&gt;
&lt;br /&gt;
Following the Executive Director report, the Finance Director gives a report. Board members should make an effort to understand the financial reports so that they can identify potential financial threats. Understanding financial reports may also generate discussion about potential opportunities.&lt;br /&gt;
&lt;br /&gt;
Subsequent reports may be given by committee chairs.&lt;br /&gt;
&lt;br /&gt;
'''OLD BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Items should include past business items that are unresolved, need further discussion, or require a board vote. Items may be tabled or referred to committee for further exploration.&lt;br /&gt;
&lt;br /&gt;
'''NEW BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Board members should have a discussion about new business items and identify a plan to take action. This may include tabling them, delaying action to a future date, or referring them to a committee.&lt;br /&gt;
&lt;br /&gt;
'''COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
At this point in the agenda, members may make announcements, such as offering congratulations or condolences, or make other special announcements. Any other business may be brought up at this time, for example, items that may need to be added to the next meeting’s agenda.&lt;br /&gt;
&lt;br /&gt;
'''ADJOURNMENT'''&lt;br /&gt;
&lt;br /&gt;
This is a formal closing of the meeting by the board chair. He should state the time that the meeting closed, so that the secretary may including it in the board minutes. The date of the next meeting should follow the adjournment item, so that board members will be reminded to put it on their calendars.&lt;br /&gt;
&lt;br /&gt;
For more information about the Roberts Rules of Order see this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
= Voting History =&lt;br /&gt;
&lt;br /&gt;
=== Historical Votes on Motions ===&lt;br /&gt;
The purpose of this is to track the position on each motion as presented and how the elected official voted on the motion. This is useful for the membership to review how elected officials voted on items that effect the organization and its [https://www.owasp.org/index.php/OWASP_Foundation_ByLaws bylaws]. A motion is a request for action (budget requests, policy changes, new partnerships etc.) they can be presented by ANYONE to the board such as a member of the public, a member of the OWASP Foundation but does require a sponsor on the Board.  That sponsor will present the motion to the board at least (10) working days in advance so it can be read in advance of the meeting.  If appropriate a motion can be presented based to take action on the motion as written. For a vote to be called and action to be taken a second board member is required to carry the business to vote. On completion of the discussion the chairman will call for a vote to the motion YES, NO, ABSTAIN. For more details on this process try this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/OWASP_Board_Votes Historical Board Votes]&lt;br /&gt;
&lt;br /&gt;
Note that if a motion is presented and is voted on and it is approved action will be taken to implement the motion.  If the motion fails it can be resubmitted and the process starts again as if it is a new motion.&lt;br /&gt;
&lt;br /&gt;
=== Attendance Tracker===&lt;br /&gt;
This is used to keep track that Board Members meet 75% attendance requirements as noted in section 3.03 of the organization bylaws. A meeting is logged as attended if the board member attends the entire meeting as scheduled from the call to order until it is adjourned, this includes executive session if applicable that is closed to the membership and general public for reasons related to human resources and legal issues that require it by law or for the good of the OWASP Foundation Inc. - &lt;br /&gt;
 [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracker]&lt;br /&gt;
&lt;br /&gt;
= Historical Meeting Archive =&lt;br /&gt;
== Archive 2019 ==&lt;br /&gt;
* [[September 2019 |September 25, 2019]] 7 PM The Netherlands CET - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=9&amp;amp;day=25&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=179&amp;amp;p3=137 other time zones]&lt;br /&gt;
* &amp;lt;s&amp;gt;[[August 2019 |August 20, 2019]] 11 AM US Pacific&amp;lt;/s&amp;gt; - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=8&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones] '''CANCELLED'''* [[July 2019 |July 16, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=7&amp;amp;day=15&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[June 2019 |June 18,  2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=6&amp;amp;day=17&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[May 2019 |May 21, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=5&amp;amp;day=20&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[April 2019 |April 29, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=4&amp;amp;day=15&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[March 2019 |March 18,  2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=3&amp;amp;day=18&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[February 2019 |February 18, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=2&amp;amp;day=18&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp; other time zones]&lt;br /&gt;
* [[January 2019 |January 23rd, 2019]] - 3:00 PM to 4:00 PM PST([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=1&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
&lt;br /&gt;
== Archive 2018 ==&lt;br /&gt;
* [[December 2018 |December 19th, 2018]] - 1:00 PM to 2:30 PM EST ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=12&amp;amp;day=19&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
* [[November 2018 |November 21, 2018]] - 12:00 PM to 1:30 PM EST ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=11&amp;amp;day=21&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
* [[October 2018 |October 10, 2018]] - 3:00 to 4:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=10&amp;amp;day=10&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) at AppSec USA 2018 Conference&lt;br /&gt;
* [[September 2018 |September 27, 2018]] - 2:00 PM to 3:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=9&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) &lt;br /&gt;
* [[August 2018 |August 15, 2018]] - 1:00 PM to 2:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=8&amp;amp;day=15&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) &lt;br /&gt;
* [[July 4th, 2018|July 4th, 2018]] - during AppSec EU 2018&lt;br /&gt;
* [[June_19,_2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=6&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 Click Here for Meeting Time in Your Timezone]&lt;br /&gt;
* [[May 15, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=5&amp;amp;day=15&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 Click Here for Meeting Time in Your Timezone]&lt;br /&gt;
* [[April 4, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=4&amp;amp;day=4&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 TimeZone Converter]&lt;br /&gt;
* [[March 7, 2018]] - 3:00pm - 4:00pm EST - [https://www.timeanddate.com/worldclock/converted.html?iso=20180307T21&amp;amp;p1=16&amp;amp;p2=16&amp;amp;p3=676&amp;amp;p4=136&amp;amp;p5=78&amp;amp;p6=179&amp;amp;p7=224&amp;amp;p8=240&amp;amp;p9=102 Time Converter]&lt;br /&gt;
* [[February 7, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=2&amp;amp;day=7&amp;amp;hour=20&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=179&amp;amp;p3=78&amp;amp;p4=102&amp;amp;p5=224&amp;amp;p6=136&amp;amp;p7=152&amp;amp;p8=676 TimeZone Converter]&lt;br /&gt;
* [[January 24, 2018]], [https://www.timeanddate.com/worldclock/fixedtime.html?msg=OWASP+Board+Meeting%2C+January+24+2018&amp;amp;iso=20180124T19&amp;amp;p1=16&amp;amp;ah=1&amp;amp;am=30 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive 2017 ==&lt;br /&gt;
* [[December 6, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=12&amp;amp;day=06&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2017]], 07:00-08:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=11&amp;amp;day=8&amp;amp;hour=15&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[October 11, 2017]],  15:00 - 17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 19, 2017]] 15:00-17:30 PDT, in Orlando at AppSecUSA - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=9&amp;amp;day=19&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 6, 2017]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=09&amp;amp;day=06&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] (Cancelled for interviews)&lt;br /&gt;
*[[August 9, 2017]], 16:00-17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=08&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[July 5, 2017]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=07&amp;amp;day=05&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[June 7, 2017]], 18:00-21:00 CEST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=06&amp;amp;day=07&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[May 9, 2017]],  18:00-19:30 IST, in Belfast at AppSecEU - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=5&amp;amp;day=9&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[April 12, 2017]], 16:00-17:00 PDT - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=04&amp;amp;day=12&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]  ('''Cancelled''' [http://lists.owasp.org/pipermail/owasp-board/2017-April/017969.html Notice by Matt Konda])&lt;br /&gt;
*[[March 22, 2017]] 06:00-07:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=3&amp;amp;day=22&amp;amp;hour=13&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] - *Special Meeting to approve the 2017 Budget*&lt;br /&gt;
* [[March 8, 2017]], 06:00-07:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=03&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 8, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=02&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 11, 2017]], 14:00-15:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=1&amp;amp;day=10&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2016 Meetings ==&lt;br /&gt;
* [[December 14, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=12&amp;amp;day=14&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* CANCELLED - [[November 30, 2016]], 15:00-16:30 PST - placeholder only optional if needed - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=30&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[October 11, 2016]], at AppSecUSA 18:00 - 21:00 EDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[September 21, 2016]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=09&amp;amp;day=21&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[August 23, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=08&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 1, 2016]], 18:00-21:00 CEST, in Rome at AppSecEU - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=01&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 27, 2016]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=27&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[May 18, 2016]],  07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=05&amp;amp;day=18&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[April 20, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=04&amp;amp;day=20&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[March 16, 2016]], 16:00-17:00 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=03&amp;amp;day=16&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 17, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=02&amp;amp;day=17&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 13, 2016]], 16:00-17:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=01&amp;amp;day=14&amp;amp;hour=00&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2015 Meetings ==&lt;br /&gt;
* [[December 9, 2015]], 15:00-17:00 PST &lt;br /&gt;
* [[November 18, 2015]], 14:00-15:30 PST&lt;br /&gt;
* [[November 4, 2015]], 12:00-13:30 PST&lt;br /&gt;
* [[October 14, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[September 25, 2015]] at AppSecUSA 18:00 - 20:00 PST&lt;br /&gt;
* [[August 12, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[July 22, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[June 24, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[May 22, 2015]],  18:00-20:00 CEST in Amsterdam @ AppSec-EU , 9:00am-11:00am PST;&lt;br /&gt;
* [[April 29, 2015]], 12:00-13:00 PST&lt;br /&gt;
* [[March 25, 2015]], 12:00-13:00 PST &lt;br /&gt;
* [[February 11, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[January 14, 2015]], 9am-10am PST&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive for 2014 Meetings ==&lt;br /&gt;
* [[December 10, 2014]], 9am-10am PST&lt;br /&gt;
* [[November 12, 2014]], 9am - 10am PST&lt;br /&gt;
* [[October 8, 2014]], 9am-10am PST&lt;br /&gt;
* [[September 16, 2014]], 6pm - 9pm MST, In person at Appsec USA &lt;br /&gt;
* [[August 13, 2014]], 9am-10am PST&lt;br /&gt;
* [[July 9, 2014]], 9am-10am PST&lt;br /&gt;
* [[June 27, 2014]], 8am - 4 pm BST, In person at AppSec Europe&lt;br /&gt;
* [[April 30, 2014]],9am - 12pm PST&lt;br /&gt;
* [[March 3, 2014]], 7am - 10am PST&lt;br /&gt;
* [[February 24, 2014]], 8am - 10am PST&lt;br /&gt;
&lt;br /&gt;
== Archive for 2013 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[December 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
* December 2, 2013 - Special Board Meeting - [https://docs.google.com/spreadsheet/ccc?key=0ApZ9zE0hx0LNdGdJZ1BIaEZkc2V1QV81NmJ4dnI0R1E&amp;amp;usp=sharing 2014 Budget] walk through, Q &amp;amp; A (no meeting notes)&lt;br /&gt;
&lt;br /&gt;
*[[November 22, 2013]] - In person meeting at AppSec USA - New York, NY&lt;br /&gt;
&lt;br /&gt;
* November 11, 2013 - cancelled due to in person meeting on Nov. 22&lt;br /&gt;
&lt;br /&gt;
*[[October 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[September 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[In person meeting at AppSec EU - Hamburg, Germany; August 19-24]]&lt;br /&gt;
&lt;br /&gt;
* August 12, 2013 - canceled due to in person meeting on Aug 19&lt;br /&gt;
&lt;br /&gt;
*[[July 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[June 10, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 31, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 13, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[April 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[March 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[February 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[January 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2012 Meetings ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation [https://www.owasp.org/images/a/ae/2012ByLawsFINAL.pdf ByLaws]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Global_Committee_Pages Global Committees] &lt;br /&gt;
&lt;br /&gt;
*[[January 9, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 6, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 15, 2012]] &lt;br /&gt;
&lt;br /&gt;
*[[March 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[April 5, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[May 14,2012]]&lt;br /&gt;
&lt;br /&gt;
*[[June 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Aug 13, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Sept 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 8, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 24, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 26, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
*[[Dec 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Dec 27, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
== Archive for 2011 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[March 7, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[April_4_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[May_2_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[June 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[August 8, 2011]] &lt;br /&gt;
&lt;br /&gt;
*[[September 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 20, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 22, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[October 10, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[November 14, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[December 5, 2011]]&lt;br /&gt;
&lt;br /&gt;
== Minutes for 2011 Meetings ==  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Votes Historical]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[Minutes January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes March 8, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 4, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 2, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VD9ZHEwht9tmM8FKEQ6DBrtmL_gTAhSSnQhiFXYkJ7I/edit?hl=en_US&amp;amp;authkey=CIavkP4B June 6 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VMwYrP6owtZ-SchBxUcWTIF-ITvzUX8PjUkLPwr2ipg/edit?hl=en_US&amp;amp;authkey=CIGTx5sD July 11 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1CLu9aQpS7LdeX87rJ5N9cuJ-RGGVzDWf34l6gdMml7M/edit?hl=en_US&amp;amp;authkey=CI-U5qEP August 8, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1HM32VcvWb0hizD5_mhWMULLaouzuRgA3ZYjODRZwyAs/edit?hl=en_US September 6, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1Y-8tZisUZM5ZKP8AxJqvkiNtFanVFM0m--bMG2PZ3ww/edit October 10, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/13-aHX2pSUXjCP8ivsbls6u1VX1BVSYewyMUH8LI7zpQ/edit November 14, 2011]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2010 Meetings ==&lt;br /&gt;
*[[January 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[February 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]] &amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;Postponed until March 9, 2010&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[[April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[May 4, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[August 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[September 8, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[December_6_2010]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2010 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[Jan 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Feb 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes_December_6,_2010]]&lt;br /&gt;
&lt;br /&gt;
*[[OWASP Board Meetings January Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings February Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June 09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting July 7, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting August 4, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting September 1, 2009 Agenda]] &lt;br /&gt;
*[[OWASP Board Meeting October 6, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting November 10, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting December 1, 2009 Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2009 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 01-06-09]]&lt;br /&gt;
* [[OWASP Board Meetings 02-03-09]]&lt;br /&gt;
* [[OWASP Board Meetings 03-10-09]]&lt;br /&gt;
* [[OWASP Board Meetings April 09]]&lt;br /&gt;
* [[OWASP Board Meetings May 09]]&lt;br /&gt;
* [[OWASP Board Meetings June 09]]&lt;br /&gt;
* [[OWASP Board Meeting July 09]]&lt;br /&gt;
* [[OWASP Board Meeting August 09]]&lt;br /&gt;
* [[OWASP Board Meeting September 09]]&lt;br /&gt;
* [[OWASP Board Meeting October 09]]&lt;br /&gt;
* [[OWASP Board Meeting December 09]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2008 Meetings ==&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings July Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings August Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings September Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings October Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings December Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2008 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 2-7-08]]&lt;br /&gt;
* [[OWASP Board Meetings 3-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 5-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 6-3-08]]&lt;br /&gt;
* [[OWASP Board Meetings 8-14-08]]&lt;br /&gt;
* [[OWASP Board Meetings 9-2-08]] &lt;br /&gt;
* [[Owasp Board Meetings 10-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 11-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 12-02-08]]&lt;br /&gt;
&lt;br /&gt;
= Board Election Archive =&lt;br /&gt;
&lt;br /&gt;
All elected officers are required to [https://docs.google.com/document/d/10zBT6oY2Q3B6kr6r7DGl3Cc0f5rGmQ0Slc6RYvbxmus/edit review sign and return] the following document before starting their term in office to the then current board Secretary &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History OWASP Board History]&lt;br /&gt;
&lt;br /&gt;
===2017 Election===&lt;br /&gt;
[https://www.owasp.org/index.php/2017_Global_Board_of_Directors_Election 2017 Board Election]&lt;br /&gt;
=== 2016 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2016_Global_Board_of_Directors_Election 2016 Board Election]&lt;br /&gt;
=== 2015 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2015_Global_Board_of_Directors_Election 2015 Board Election]&lt;br /&gt;
=== 2014 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2014_Board_Elections 2014 Board Election]&lt;br /&gt;
=== 2013 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2013_Board_Elections 2013 Board Election]&lt;br /&gt;
=== 2012 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2012_Election 2012 Board Election]&lt;br /&gt;
=== 2011 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2011Election 2011 Board Election]&lt;br /&gt;
=== 2009 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Board_Election_2009 2009 Board Election]&lt;br /&gt;
&lt;br /&gt;
=== Past OWASP Boards ===&lt;br /&gt;
&lt;br /&gt;
[[Board-2018]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2017]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2016]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2015]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2014]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2013]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2012]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2011]]&lt;br /&gt;
&lt;br /&gt;
= Misc. =&lt;br /&gt;
&lt;br /&gt;
* Teleconference Information: **CHECK MEETING INFORMATION**&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/International_Toll_Free_Calling_Information International Toll Free Calling Info]&lt;br /&gt;
&lt;br /&gt;
* Meeting Template found [https://www.owasp.org/index.php/Board-Meeting-template here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt; &amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=October_2019&amp;diff=256009</id>
		<title>October 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=October_2019&amp;diff=256009"/>
				<updated>2019-11-10T19:32:31Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Meeting Date:&lt;br /&gt;
Oct 15&lt;br /&gt;
&lt;br /&gt;
Meeting Time:&lt;br /&gt;
11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=10&amp;amp;day=21&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
Meeting Location:&lt;br /&gt;
Remote&lt;br /&gt;
&lt;br /&gt;
Virtual: &lt;br /&gt;
[https://zoom.us/j/282821949 Zoom Meeting Link]  Meeting ID: 282 821 949 - [https://zoom.us/u/kvUg3969 local dial in numbers]&lt;br /&gt;
&lt;br /&gt;
Link to meeting Recording: - https://drive.google.com/open?id=1y-ojjcUp4bZ-RU8xbylCOlM_xdN-3Ly9&lt;br /&gt;
&lt;br /&gt;
 AGENDA&lt;br /&gt;
&lt;br /&gt;
 CALL TO ORDER&lt;br /&gt;
&lt;br /&gt;
 CHANGES TO THE AGENDA&lt;br /&gt;
&lt;br /&gt;
 APPROVAL OF MINUTES&lt;br /&gt;
 [https://docs.google.com/document/d/1C1RGzyApVHQ9zIm83pHkzFXuGlaFCQR8D-n8Btm1-8s/edit?usp=sharing September 2019 Minutes]&lt;br /&gt;
&lt;br /&gt;
 REPORTS&lt;br /&gt;
&lt;br /&gt;
=== Executive Director Update for October 2019 ===&lt;br /&gt;
&lt;br /&gt;
===== Key Metrics (Sept): ===== &lt;br /&gt;
* Members: 2,800&lt;br /&gt;
* Momentum: 643.3K visitors to websites in Sept (1.4K increase to 2018)&lt;br /&gt;
* Money: (Draft financials will be available around the 20th)&lt;br /&gt;
* Operations&lt;br /&gt;
** 100% of Service Desk tickets closed within SLA&lt;br /&gt;
** 87% of Non-Funding tickets were closed within SLA&lt;br /&gt;
&lt;br /&gt;
===== Global Conferences ===== &lt;br /&gt;
We successfully hosted two Global Conferences in a short three week window. Many thanks to everyone for making the events a success - and especially Emily and Sibah from staff. The DC event hosted 723 attendees and AMS has 513.  We are working with accounting to get a final P&amp;amp;L for both events. I do expect the end profit to be less than budgeted, but as we have been stating we are also closely watching expenses so the net profit should be closer aligned with our budget. I have already provided the final survey results from attendees. As previously noted, over 90% of attendees for both conferences would recommend the event to others.&lt;br /&gt;
&lt;br /&gt;
Planning is already well underway for 2020. SF contract has been signed and the Dublin contract is on the Board call agenda for today. Budgets have been developed and a more proper project plan should be complete for both events in the next few weeks. Both conferences together are budgeted to generate over $1,200,000 in profits for the Foundation. Also of note is our migration to a Program Team and away from the local chapter model for the event program. We are completing the final details on that change and will share details soon.&lt;br /&gt;
&lt;br /&gt;
===== Projects Summit ===== &lt;br /&gt;
Staff have been collecting feedback and discussing the best setup for these events. As part of the 2020 Operating Plan, we will be recommending TWO events that host five projects each hosted in Winter and Summer. We elected for this format primarily to reduce the risk of a bad initial design that we correct for 2H20 and to offer two geographies for project volunteer convenience. We intend for projects to self-nominate with a work plan and goals for the Summit. If accepted we would offer travel grants for up to 5 contributors to each project. Others would be allowed to attend but we would make it VERY clear that these are contributing events - not suitable for spectators.  Our expectation is that each of these events will cost approximately $75,000. Emily is sourcing locations for the last week of February in Cancun in Mexico.&lt;br /&gt;
&lt;br /&gt;
===== Website =====&lt;br /&gt;
Work continues to get the website launched. Our current target launch continues to slip. There have been a variety of factors: delays in assistance from GitHub, slow pickup and migration work by Projects and Chapter leaders (only 97 leader have signed up), and we are rethinking our launch plan. We will likely engage the firm recommended by Chengxi to assist with our migration and follow on SEO support. Our search and backlink ranking - especially given the scope of our content - is too valuable to try to do inhouse. This change alone will move our launch date to early December. The site is ready for Chapters and Projects to migrate their pages and some have already done so. In addition to this work, Dawn and Mike have been working on the Policies/Procedure content which is posing some challenges. Finally we plan to contract our some commerce form work for the new site which includes Donations, Membership, and Events.  Our expectation is this migration will improve the user experience and lower our costs.&lt;br /&gt;
&lt;br /&gt;
===== Preparing for 2020 =====&lt;br /&gt;
I have been working on the 2020 Operating Plan and Budget. Generally there will not be wholesale changes but likely incremental new projects like the Projects Summit and our plans to pilot AppSec Days. I intend to present both of these work items for the Boards review as early as the next Board meeting. My goal is that our Budget is approved NO LATER than the November call.&lt;br /&gt;
&lt;br /&gt;
===== Board Elections =====&lt;br /&gt;
We will be announcing the results of the election tomorrow. As of this morning that have been 496 votes cast.&lt;br /&gt;
&lt;br /&gt;
===== Trademark =====&lt;br /&gt;
The EU PTO rejected our application for OWASP. I have approved an additional work item with counsel to respond with additional evidence of prior use and distinctness. We expect news on that filing before the end of the year.  There haven't been any other updates on our other filings as of today.&lt;br /&gt;
&lt;br /&gt;
 OLD BUSINESS&lt;br /&gt;
&lt;br /&gt;
 NEW BUSINESS&lt;br /&gt;
&lt;br /&gt;
 COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS&lt;br /&gt;
&lt;br /&gt;
 ADJOURNMENT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&lt;br /&gt;
&lt;br /&gt;
==Old Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
==New Business==&lt;br /&gt;
Resolved that the OWASP Board of Directors authorizes the Executive Director to sign an agreement with the Dublin, Ireland Convention Centre with a projected financial commitment of 150,000 EUR to host Global AppSec Dublin in June of 2020.&lt;br /&gt;
&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=About_OWASP/HR&amp;diff=254810</id>
		<title>About OWASP/HR</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=About_OWASP/HR&amp;diff=254810"/>
				<updated>2019-09-19T14:25:09Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: removing interim&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align: top;&amp;quot; | [[Image:Staff_mike.jpg|140 px|left]]&lt;br /&gt;
| &amp;lt;h1&amp;gt;Mike McCamon&amp;lt;/h1&amp;gt;&amp;lt;br /&amp;gt;'''Executive Director'''&amp;lt;br /&amp;gt;Kansas&amp;lt;p&amp;gt;The Executive Director is ultimately responsible for overseeing the administration, programs and strategic plan of the organization.&amp;lt;/p&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align: top;&amp;quot; |[[Image:Staff_emily.jpg|140 px|left]]&lt;br /&gt;
| &amp;lt;h1&amp;gt;Emily Berman&amp;lt;/h1&amp;gt;&amp;lt;br /&amp;gt;'''Director of Events'''&amp;lt;br /&amp;gt;Colorado&amp;lt;p&amp;gt;The Director of Events is responsible for the success of the Company’s event programming including global events and other initiatives. Additionally the Events Director will collaborate with leaders, members, and partners to grow and evolve our regional and local events.&amp;lt;/p&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align: top;&amp;quot; |[[Image:Staff_harold.jpg|140 px|left]]&lt;br /&gt;
| &amp;lt;h1&amp;gt;Harold Blankenship&amp;lt;/h1&amp;gt;&amp;lt;br /&amp;gt;'''Director of Technology &amp;amp; Projects'''&amp;lt;br /&amp;gt;Texas&amp;lt;p&amp;gt;The Director of Technology &amp;amp; Projects nurtures, manages, facilitates, and supports the volunteer open source programs of the Foundation. Additionally the Director of Technology &amp;amp; Projects will, with the support of staff and partners, champion, manage, and execute the technology roadmap of the Foundation.&amp;lt;/p&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align: top;&amp;quot; |[[Image:Staff_kelly.jpg|140 px|left]]&lt;br /&gt;
| &amp;lt;h1&amp;gt;Kelly Santalucia&amp;lt;/h1&amp;gt;&amp;lt;br /&amp;gt;'''Director of Corporate Support'''&amp;lt;br /&amp;gt;New Jersey&amp;lt;p&amp;gt;The Director of Corporate Support identifies, nurtures, develops, documents, solicits, and closes sponsorships and grants for the Foundation and its mission. Also the Director of Corporate Support will collaborate with staff, leaders, and members to improve our membership and events offerings for partners.&amp;lt;/p&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align: top;&amp;quot; |[[Image:Staff_dawn.png|140 px|left]]&lt;br /&gt;
| &amp;lt;h1&amp;gt;Dawn Aitken&amp;lt;/h1&amp;gt;&amp;lt;br /&amp;gt;'''Community &amp;amp; Operations Manager'''&amp;lt;br /&amp;gt;Florida&amp;lt;p&amp;gt;The Community &amp;amp; Operations Manager proactively runs the Foundation’s core business and chapter functions in a professional, consistent, efficient, and cost-effective manner. Generally these functions include opening and closing local chapters; proactively supporting chapter leaders; regularly ensuring the accuracy and integrity of chapter, member and other data; leadership and primary liaison for accounts payable; and semi-annually audit processes and signatory authorities ensuring issues are resolved. Additionally the Community &amp;amp; Operations Manager along with support from staff and partners will accurately document and implement the policies of the Foundation.&amp;lt;/p&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align: top;&amp;quot; |[[Image:Staff_lisa.jpg|140 px|left]]&lt;br /&gt;
| &amp;lt;h1&amp;gt;Lisa Jones&amp;lt;/h1&amp;gt;&amp;lt;br /&amp;gt;'''Sales &amp;amp; Marketing Operations Manager'''&amp;lt;br /&amp;gt;North Carolina&amp;lt;p&amp;gt;The Sales &amp;amp; Marketing Operations Manager supports and coordinates core communication, promotional, member, and sales functions of the Foundation. Generally these functions include the development and execution of professional, regular, and impactful communications in both long and short form through email marketing and social media; proactively leading, managing, and facilitating co-marketing programs; regularly ensuring the accuracy and integrity of member data; supporting and assisting potential individual members; execution of and primary liaison for invoicing and accounts receivable; and ensure corporate member and sponsor benefits are delivered accurately and on schedule.&amp;lt;/p&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;vertical-align: top;&amp;quot; |[[Image:Staff_sibah.jpg|140 px|left]]&lt;br /&gt;
| &amp;lt;h1&amp;gt;Sibah Poede&amp;lt;/h1&amp;gt;&amp;lt;br /&amp;gt;'''Events Coordinator'''&amp;lt;br /&amp;gt;U.K.&amp;lt;p&amp;gt;Organize logistical and administrative support for while coordinating with sales team to develop the strategy and direction of events. Collaborate with the marketing and design teams to facilitate event promotion. Support staff in managing budgets, calendars, and partnerships for event efforts. Collaborate with leaders, members, and partners to grow and evolve regional events.&amp;lt;/p&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==OWASP HR Resources==&lt;br /&gt;
* [https://www.owasp.org/images/2/28/EmployeeHandbook2014.pdf OWASP Foundation Employee Handbook]&lt;br /&gt;
* [https://docs.google.com/document/d/1ZWqUOcCYY40yBsdiSf9Y9oY4XLM8AR67VQu9aYN0syI/edit?usp=sharing Employee and Contractor Annual Review Process], [https://docs.google.com/document/d/1yjgy-G5vOvzKN7_vIksElEYtbTwm016SdckvLst_yxw/edit?usp=sharing Employee Self Review and Supervisor Review Form], [https://docs.google.com/document/d/1GsGf5WCsj-6-MVb-vyguiSku7v_XK5K4K6DxX9f2tOQ/edit?usp=sharing Employee Peer Review Form]&lt;br /&gt;
*[https://www.owasp.org/index.php/Governance/Conflict_of_Interest_Policy OWASP Conflict of Interest Policy and Annual Questionnaire]&lt;br /&gt;
*[https://www.owasp.org/index.php/Governance/Whistleblower_Policy OWASP Whistleblower &amp;amp; Anti-Retaliation Policy]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=254768</id>
		<title>User:Owen Pendlebury</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=254768"/>
				<updated>2019-09-16T12:54:03Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OwenPendlebury.jpg|left|]]&lt;br /&gt;
&lt;br /&gt;
Owen is the current Vice-Chair of the OWASP global Board of Directors. &lt;br /&gt;
&lt;br /&gt;
Owen graduated in 2009 from Dundalk Institute of Technology, with a degree in Computer Applications and Support and an honours degree in IT Management specialising in web application development and networking. In 2009, Owen completed an MSc in Security &amp;amp; Forensic Computing from Dublin City University.&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and led the Dublin Chapter of the Open Web Application Security Project (OWASP) organisation. In 2017 was elected to its Global Board of Directors where he held the role of Secretary and recently Vice-Chair of the global foundation. In 2016, Owen was awarded an OWASP Web Application Person of the Year (WASPY) award for Innovation and Sharing. &lt;br /&gt;
&lt;br /&gt;
Some of the projects that Owen has been involved in include, AppSec EU 2016/2017/2018/2019 Committee/ Training/ Speaker Committee chair, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars, speaking on behalf of OWASP at BlackHat USA and EU, Cyber Security Summer Camp for school kids and OWASP Women in AppSec Committee/ mentoring. &lt;br /&gt;
&lt;br /&gt;
Owen has over 10 years’ experience in penetration testing and red teaming, working as part of several global Attack and Penetration Teams at “Big 4” professional service firms. He currently leads the penetration testing and red teaming teams for Deloitte Ireland and has in-depth experience of application, network, wireless and device penetration testing, having served numerous local and global institutions as clients in this area. Within Deloitte, Owen acts as vulnerability management lead for the EMEA region, setting the strategic direction, quality standards and deliverables for vulnerability management across EMEA. As part of this role, Owen has brought his colleagues from both EMEA and across the globe together to collaborate on innovative projects as well as client pitches. &lt;br /&gt;
&lt;br /&gt;
He also lectures and sits on the computer science program boards at the National College of Ireland (NCI) in web application, network security, and secure application development. In 2017, Owen was approached to architect a MSc, Degree and HDip in cyber security for NCI and has been working actively in supporting the bridge between academia and industry. He is also a keen advocate of diversity in cyber security and takes an active role in supporting the OWASP Women in AppSec group through mentoring and working with those who are trying to get into the field.   &lt;br /&gt;
&lt;br /&gt;
== '''Answers to 2019 Global Board of Directors Questions/ Answers''' ==&lt;br /&gt;
&lt;br /&gt;
Link to Video - https://youtu.be/Gr0bZLz1o3Y&lt;br /&gt;
&lt;br /&gt;
'''1. What are the 3 biggest challenges you think OWASP is facing and how do you think we can solve them?'''&lt;br /&gt;
* Economies of scale - I think as a global community we are facing a lot of challenges, one of which is how can we bring OWASP and our conferences to more economically challenged areas. To combat this, we on the board of directors have been discussing introducing an economy of scales for locations like this. &lt;br /&gt;
* Diversity – we have an extremely big community but one thing we need to put a lot of effort into is, reaching out to the minorities. We have been doing this already through WIA and outreach programs such as Defcon/ BlackHat. We need to put more emphasis into our outreach to these minorities. &lt;br /&gt;
* Staying relevant – OWASP is nothing without our community, who create the content/ projects that makes OWASP what it is. If we do not put the time and effort into making OWASP the place to be to work on these projects, what’s to stop another organisation from competing with us. We need to ensure that OWASP is where people want to come to collaborate and further our mission of improving software security. &lt;br /&gt;
'''2. Many say the &amp;quot;O&amp;quot; in OWASP stands for &amp;quot;Open&amp;quot;, and that we must remain &amp;quot;open&amp;quot; at all costs. In the past this has resulted in allowing known-bullies to persist within our community. Do you feel that remaining &amp;quot;open&amp;quot; is more/less/equally important to ensuring a safe, respectful and harassment free community? And why.'''&lt;br /&gt;
&lt;br /&gt;
I think in my tenure on the board of directors we have not stood for this behaviour. We are all adults, we all have to act as the professionals and treat people how we would want to be treated. There is a line where we have to interpret peoples culture, whether it is misinterpreted as part of an email which is read in the heat of the moment or whether people are just being plain inappropriate. There is no place for this behaviour in OWASP and if re-elected I will maintain my stance of a safe, respectful and harassment free community. In the end the community is OWASP, and we need to make it a safe place for all the cool people that make OWASP what it is. &lt;br /&gt;
&lt;br /&gt;
'''3. How do you hope/plan to improve OWASP's financial situation?'''&lt;br /&gt;
&lt;br /&gt;
This is one of those hard to answer questions. In the past few years we have struggled as a foundation to maintain the standards expected of an organisation our size due to fluctuation at an ED level. Now that we have consistency in the form of Mike we are able to pick out the pain points within the foundation and start to improve on them. One of which is our conferences, im not going to lie this is our main source of revenue, although every time we run a conference we are starting from scratch each time. By creating a solid baseline for the foundation to grow from, I believe the financial situation will continue to improve&lt;br /&gt;
&lt;br /&gt;
'''4. How do you hope/plan to better support and encourage the OWASP projects, chapters, and staff?'''&lt;br /&gt;
&lt;br /&gt;
By being there for them, whether it be for a coffee, an email or a call I will always have been and will be available for all three groups. As I mentioned before OWASP is the community and projects, chapters and staff are all part of our community, we should all work together for our common goal. &lt;br /&gt;
&lt;br /&gt;
'''5.  How do you hope/plan to improve OWASP's community? We have had some angry chapters, projects and community members, how do you hope/plan to improve community relations and relationships?'''&lt;br /&gt;
&lt;br /&gt;
By enabling them to provide feedback and prompt change. With the committee 2.0 model the community has a structure to enable change. None of us are perfect but if we all work together then we can really make a difference. One of the issues I’ve noticed over the past two years on the board is that information is communicated via email which can be misconstrued, maybe it’s time to make these communications via live town halls to enable the community to have an input. &lt;br /&gt;
&lt;br /&gt;
'''6. How do you hope/plan to draw a more diverse group of newcomers to OWASP? Women, people of colour, non-binary, students, second-career, LGBT, people with disabilities, and other groups that are under represented both in our industry and in our community. How do you hope/plan to attract them to our community, events, foundation, projects and chapters?'''&lt;br /&gt;
&lt;br /&gt;
We need to provide a platform for each. WIA is a great example of our diversity outreach program, another is the funds we are putting into scholarships for those to attend a global appsec conference. One idea I proposed at a recent board meeting and on social media was the idea of OWASP enabling college students to complete internships reporting directly into the project leader. &lt;br /&gt;
&lt;br /&gt;
'''7. How do you hope/plan to improve the AppSec Global events? Do you feel they need improving?'''&lt;br /&gt;
&lt;br /&gt;
We need to standardise our conferences, as previously mentioned every time we run a conference, we start as if we have never done it before. Everything needs to be documented and we need to run conferences as a conference in a box approach. We also need to promote our conferences earlier as well as encourage a more diverse audience/ speakers through scholarships and initiatives. &lt;br /&gt;
&lt;br /&gt;
'''8.  How do you plan to handle the  massive stress, time and responsibility of being an OWASP Board member on top of your other professional duties? How many hours a week do you plan to dedicate specifically to the role of OWASP board member?'''&lt;br /&gt;
&lt;br /&gt;
This is something that’s very volatile. In my first year on the global board I took up the secretary board role and in my second-year vice-chair. Both have involved putting in a lot of hours both in the evenings and on weekends to fulfil the roles. As vice chair I have at least 3 calls a week generally Monday- Wednesday with ad-hoc calls with staff and the chair when required. I’ve really enjoyed my role on the board and do not see it as a burden but a challenge to make something great, even better. &lt;br /&gt;
&lt;br /&gt;
== '''References''' ==&lt;br /&gt;
'''John Doherty Msc Security &amp;amp; Forensic Computing'''&lt;br /&gt;
&lt;br /&gt;
Owen was my lecturer for Security in NCI. His class and teaching made me seek a further interest in the cyber security field. Even after college I kept in touch with him and he gave me advice and encouraged me to do a masters in security in DCU. &lt;br /&gt;
&lt;br /&gt;
Since then Owen pointed me to the OWASP mailing list which keeps me updated on chapter meetings which I regularly attend and also cyber security job postings and courses. The speakers that have attended have been very interesting and informative. &lt;br /&gt;
&lt;br /&gt;
Owen is now advising/helping me with my DCU masters practicum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''‪Mark Denihan OWASP Security Shepherd Project Lead'''&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''Fabio Cerullo Managing Director at Cycubix'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
‪'''Jason flood CTO of Security Gamification at IBM'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=254273</id>
		<title>User:Owen Pendlebury</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=254273"/>
				<updated>2019-08-28T13:22:47Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OwenPendlebury.jpg|left|]]&lt;br /&gt;
&lt;br /&gt;
Owen graduated in 2009 from Dundalk Institute of Technology, with a degree in Computer Applications and Support and an honours degree in IT Management specialising in web application development and networking. In 2009, Owen completed an MSc in Security &amp;amp; Forensic Computing from Dublin City University.&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and led the Dublin Chapter of the Open Web Application Security Project (OWASP) organisation. In 2017 was elected to its Global Board of Directors where he held the role of Secretary and recently Vice-Chair of the global foundation. In 2016, Owen was awarded an OWASP Web Application Person of the Year (WASPY) award for Innovation and Sharing. &lt;br /&gt;
&lt;br /&gt;
Some of the projects that Owen has been involved in include, AppSec EU 2016/2017/2018/2019 Committee/ Training/ Speaker Committee chair, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars, speaking on behalf of OWASP at BlackHat USA and EU, Cyber Security Summer Camp for school kids and OWASP Women in AppSec Committee/ mentoring. &lt;br /&gt;
&lt;br /&gt;
Owen has over 10 years’ experience in penetration testing and red teaming, working as part of several global Attack and Penetration Teams at “Big 4” professional service firms. He currently leads the penetration testing and red teaming teams for Deloitte Ireland and has in-depth experience of application, network, wireless and device penetration testing, having served numerous local and global institutions as clients in this area. Within Deloitte, Owen acts as vulnerability management lead for the EMEA region, setting the strategic direction, quality standards and deliverables for vulnerability management across EMEA. As part of this role, Owen has brought his colleagues from both EMEA and across the globe together to collaborate on innovative projects as well as client pitches. &lt;br /&gt;
&lt;br /&gt;
He also lectures and sits on the computer science program boards at the National College of Ireland (NCI) in web application, network security, and secure application development. In 2017, Owen was approached to architect a MSc, Degree and HDip in cyber security for NCI and has been working actively in supporting the bridge between academia and industry. He is also a keen advocate of diversity in cyber security and takes an active role in supporting the OWASP Women in AppSec group through mentoring and working with those who are trying to get into the field.   &lt;br /&gt;
&lt;br /&gt;
== '''Answers to 2019 Global Board of Directors Questions/ Answers''' ==&lt;br /&gt;
&lt;br /&gt;
Link to Video - https://youtu.be/Gr0bZLz1o3Y&lt;br /&gt;
&lt;br /&gt;
'''1. What are the 3 biggest challenges you think OWASP is facing and how do you think we can solve them?'''&lt;br /&gt;
* Economies of scale - I think as a global community we are facing a lot of challenges, one of which is how can we bring OWASP and our conferences to more economically challenged areas. To combat this, we on the board of directors have been discussing introducing an economy of scales for locations like this. &lt;br /&gt;
* Diversity – we have an extremely big community but one thing we need to put a lot of effort into is, reaching out to the minorities. We have been doing this already through WIA and outreach programs such as Defcon/ BlackHat. We need to put more emphasis into our outreach to these minorities. &lt;br /&gt;
* Staying relevant – OWASP is nothing without our community, who create the content/ projects that makes OWASP what it is. If we do not put the time and effort into making OWASP the place to be to work on these projects, what’s to stop another organisation from competing with us. We need to ensure that OWASP is where people want to come to collaborate and further our mission of improving software security. &lt;br /&gt;
'''2. Many say the &amp;quot;O&amp;quot; in OWASP stands for &amp;quot;Open&amp;quot;, and that we must remain &amp;quot;open&amp;quot; at all costs. In the past this has resulted in allowing known-bullies to persist within our community. Do you feel that remaining &amp;quot;open&amp;quot; is more/less/equally important to ensuring a safe, respectful and harassment free community? And why.'''&lt;br /&gt;
&lt;br /&gt;
I think in my tenure on the board of directors we have not stood for this behaviour. We are all adults, we all have to act as the professionals and treat people how we would want to be treated. There is a line where we have to interpret peoples culture, whether it is misinterpreted as part of an email which is read in the heat of the moment or whether people are just being plain inappropriate. There is no place for this behaviour in OWASP and if re-elected I will maintain my stance of a safe, respectful and harassment free community. In the end the community is OWASP, and we need to make it a safe place for all the cool people that make OWASP what it is. &lt;br /&gt;
&lt;br /&gt;
'''3. How do you hope/plan to improve OWASP's financial situation?'''&lt;br /&gt;
&lt;br /&gt;
This is one of those hard to answer questions. In the past few years we have struggled as a foundation to maintain the standards expected of an organisation our size due to fluctuation at an ED level. Now that we have consistency in the form of Mike we are able to pick out the pain points within the foundation and start to improve on them. One of which is our conferences, im not going to lie this is our main source of revenue, although every time we run a conference we are starting from scratch each time. By creating a solid baseline for the foundation to grow from, I believe the financial situation will continue to improve&lt;br /&gt;
&lt;br /&gt;
'''4. How do you hope/plan to better support and encourage the OWASP projects, chapters, and staff?'''&lt;br /&gt;
&lt;br /&gt;
By being there for them, whether it be for a coffee, an email or a call I will always have been and will be available for all three groups. As I mentioned before OWASP is the community and projects, chapters and staff are all part of our community, we should all work together for our common goal. &lt;br /&gt;
&lt;br /&gt;
'''5.  How do you hope/plan to improve OWASP's community? We have had some angry chapters, projects and community members, how do you hope/plan to improve community relations and relationships?'''&lt;br /&gt;
&lt;br /&gt;
By enabling them to provide feedback and prompt change. With the committee 2.0 model the community has a structure to enable change. None of us are perfect but if we all work together then we can really make a difference. One of the issues I’ve noticed over the past two years on the board is that information is communicated via email which can be misconstrued, maybe it’s time to make these communications via live town halls to enable the community to have an input. &lt;br /&gt;
&lt;br /&gt;
'''6. How do you hope/plan to draw a more diverse group of newcomers to OWASP? Women, people of colour, non-binary, students, second-career, LGBT, people with disabilities, and other groups that are under represented both in our industry and in our community. How do you hope/plan to attract them to our community, events, foundation, projects and chapters?'''&lt;br /&gt;
&lt;br /&gt;
We need to provide a platform for each. WIA is a great example of our diversity outreach program, another is the funds we are putting into scholarships for those to attend a global appsec conference. One idea I proposed at a recent board meeting and on social media was the idea of OWASP enabling college students to complete internships reporting directly into the project leader. &lt;br /&gt;
&lt;br /&gt;
'''7. How do you hope/plan to improve the AppSec Global events? Do you feel they need improving?'''&lt;br /&gt;
&lt;br /&gt;
We need to standardise our conferences, as previously mentioned every time we run a conference, we start as if we have never done it before. Everything needs to be documented and we need to run conferences as a conference in a box approach. We also need to promote our conferences earlier as well as encourage a more diverse audience/ speakers through scholarships and initiatives. &lt;br /&gt;
&lt;br /&gt;
'''8.  How do you plan to handle the  massive stress, time and responsibility of being an OWASP Board member on top of your other professional duties? How many hours a week do you plan to dedicate specifically to the role of OWASP board member?'''&lt;br /&gt;
&lt;br /&gt;
This is something that’s very volatile. In my first year on the global board I took up the secretary board role and in my second-year vice-chair. Both have involved putting in a lot of hours both in the evenings and on weekends to fulfil the roles. As vice chair I have at least 3 calls a week generally Monday- Wednesday with ad-hoc calls with staff and the chair when required. I’ve really enjoyed my role on the board and do not see it as a burden but a challenge to make something great, even better. &lt;br /&gt;
&lt;br /&gt;
== '''References''' ==&lt;br /&gt;
'''John Doherty Msc Security &amp;amp; Forensic Computing'''&lt;br /&gt;
&lt;br /&gt;
Owen was my lecturer for Security in NCI. His class and teaching made me seek a further interest in the cyber security field. Even after college I kept in touch with him and he gave me advice and encouraged me to do a masters in security in DCU. &lt;br /&gt;
&lt;br /&gt;
Since then Owen pointed me to the OWASP mailing list which keeps me updated on chapter meetings which I regularly attend and also cyber security job postings and courses. The speakers that have attended have been very interesting and informative. &lt;br /&gt;
&lt;br /&gt;
Owen is now advising/helping me with my DCU masters practicum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''‪Mark Denihan OWASP Security Shepherd Project Lead'''&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''Fabio Cerullo Managing Director at Cycubix'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
‪'''Jason flood CTO of Security Gamification at IBM'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=254251</id>
		<title>User:Owen Pendlebury</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=254251"/>
				<updated>2019-08-27T20:01:35Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OwenPendlebury.jpg|left|]]&lt;br /&gt;
&lt;br /&gt;
Owen graduated in 2009 from Dundalk Institute of Technology, with a degree in Computer Applications and Support and an honours degree in IT Management specialising in web application development and networking. In 2009, Owen completed an MSc in Security &amp;amp; Forensic Computing from Dublin City University.&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and led the Dublin Chapter of the Open Web Application Security Project (OWASP) organisation. In 2017 was elected to its Global Board of Directors where he held the role of Secretary and recently Vice-Chair of the global foundation. In 2016, Owen was awarded an OWASP Web Application Person of the Year (WASPY) award for Innovation and Sharing. &lt;br /&gt;
&lt;br /&gt;
Some of the projects that Owen has been involved in include, AppSec EU 2016/2017/2018/2019 Committee/ Training/ Speaker Committee chair, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars, speaking on behalf of OWASP at BlackHat USA and EU, Cyber Security Summer Camp for school kids and OWASP Women in AppSec Committee/ mentoring. &lt;br /&gt;
&lt;br /&gt;
Owen has over 10 years’ experience in penetration testing and red teaming, working as part of several global Attack and Penetration Teams at “Big 4” professional service firms. He currently leads the penetration testing and red teaming teams for Deloitte Ireland and has in-depth experience of application, network, wireless and device penetration testing, having served numerous local and global institutions as clients in this area. Within Deloitte, Owen acts as vulnerability management lead for the EMEA region, setting the strategic direction, quality standards and deliverables for vulnerability management across EMEA. As part of this role, Owen has brought his colleagues from both EMEA and across the globe together to collaborate on innovative projects as well as client pitches. &lt;br /&gt;
&lt;br /&gt;
He also lectures and sits on the computer science program boards at the National College of Ireland (NCI) in web application, network security, and secure application development. In 2017, Owen was approached to architect a MSc, Degree and HDip in cyber security for NCI and has been working actively in supporting the bridge between academia and industry. He is also a keen advocate of diversity in cyber security and takes an active role in supporting the OWASP Women in AppSec group through mentoring and working with those who are trying to get into the field.   &lt;br /&gt;
&lt;br /&gt;
== '''Answers to 2019 Global Board of Directors Questions/ Answers''' ==&lt;br /&gt;
&lt;br /&gt;
'''1. What are the 3 biggest challenges you think OWASP is facing and how do you think we can solve them?'''&lt;br /&gt;
* Economies of scale - I think as a global community we are facing a lot of challenges, one of which is how can we bring OWASP and our conferences to more economically challenged areas. To combat this, we on the board of directors have been discussing introducing an economy of scales for locations like this. &lt;br /&gt;
* Diversity – we have an extremely big community but one thing we need to put a lot of effort into is, reaching out to the minorities. We have been doing this already through WIA and outreach programs such as Defcon/ BlackHat. We need to put more emphasis into our outreach to these minorities. &lt;br /&gt;
* Staying relevant – OWASP is nothing without our community, who create the content/ projects that makes OWASP what it is. If we do not put the time and effort into making OWASP the place to be to work on these projects, what’s to stop another organisation from competing with us. We need to ensure that OWASP is where people want to come to collaborate and further our mission of improving software security. &lt;br /&gt;
'''2. Many say the &amp;quot;O&amp;quot; in OWASP stands for &amp;quot;Open&amp;quot;, and that we must remain &amp;quot;open&amp;quot; at all costs. In the past this has resulted in allowing known-bullies to persist within our community. Do you feel that remaining &amp;quot;open&amp;quot; is more/less/equally important to ensuring a safe, respectful and harassment free community? And why.'''&lt;br /&gt;
&lt;br /&gt;
I think in my tenure on the board of directors we have not stood for this behaviour. We are all adults, we all have to act as the professionals and treat people how we would want to be treated. There is a line where we have to interpret peoples culture, whether it is misinterpreted as part of an email which is read in the heat of the moment or whether people are just being plain inappropriate. There is no place for this behaviour in OWASP and if re-elected I will maintain my stance of a safe, respectful and harassment free community. In the end the community is OWASP, and we need to make it a safe place for all the cool people that make OWASP what it is. &lt;br /&gt;
&lt;br /&gt;
'''3. How do you hope/plan to improve OWASP's financial situation?'''&lt;br /&gt;
&lt;br /&gt;
This is one of those hard to answer questions. In the past few years we have struggled as a foundation to maintain the standards expected of an organisation our size due to fluctuation at an ED level. Now that we have consistency in the form of Mike we are able to pick out the pain points within the foundation and start to improve on them. One of which is our conferences, im not going to lie this is our main source of revenue, although every time we run a conference we are starting from scratch each time. By creating a solid baseline for the foundation to grow from, I believe the financial situation will continue to improve&lt;br /&gt;
&lt;br /&gt;
'''4. How do you hope/plan to better support and encourage the OWASP projects, chapters, and staff?'''&lt;br /&gt;
&lt;br /&gt;
By being there for them, whether it be for a coffee, an email or a call I will always have been and will be available for all three groups. As I mentioned before OWASP is the community and projects, chapters and staff are all part of our community, we should all work together for our common goal. &lt;br /&gt;
&lt;br /&gt;
'''5.  How do you hope/plan to improve OWASP's community? We have had some angry chapters, projects and community members, how do you hope/plan to improve community relations and relationships?'''&lt;br /&gt;
&lt;br /&gt;
By enabling them to provide feedback and prompt change. With the committee 2.0 model the community has a structure to enable change. None of us are perfect but if we all work together then we can really make a difference. One of the issues I’ve noticed over the past two years on the board is that information is communicated via email which can be misconstrued, maybe it’s time to make these communications via live town halls to enable the community to have an input. &lt;br /&gt;
&lt;br /&gt;
'''6. How do you hope/plan to draw a more diverse group of newcomers to OWASP? Women, people of colour, non-binary, students, second-career, LGBT, people with disabilities, and other groups that are under represented both in our industry and in our community. How do you hope/plan to attract them to our community, events, foundation, projects and chapters?'''&lt;br /&gt;
&lt;br /&gt;
We need to provide a platform for each. WIA is a great example of our diversity outreach program, another is the funds we are putting into scholarships for those to attend a global appsec conference. One idea I proposed at a recent board meeting and on social media was the idea of OWASP enabling college students to complete internships reporting directly into the project leader. &lt;br /&gt;
&lt;br /&gt;
'''7. How do you hope/plan to improve the AppSec Global events? Do you feel they need improving?'''&lt;br /&gt;
&lt;br /&gt;
We need to standardise our conferences, as previously mentioned every time we run a conference, we start as if we have never done it before. Everything needs to be documented and we need to run conferences as a conference in a box approach. We also need to promote our conferences earlier as well as encourage a more diverse audience/ speakers through scholarships and initiatives. &lt;br /&gt;
&lt;br /&gt;
'''8.  How do you plan to handle the  massive stress, time and responsibility of being an OWASP Board member on top of your other professional duties? How many hours a week do you plan to dedicate specifically to the role of OWASP board member?'''&lt;br /&gt;
&lt;br /&gt;
This is something that’s very volatile. In my first year on the global board I took up the secretary board role and in my second-year vice-chair. Both have involved putting in a lot of hours both in the evenings and on weekends to fulfil the roles. As vice chair I have at least 3 calls a week generally Monday- Wednesday with ad-hoc calls with staff and the chair when required. I’ve really enjoyed my role on the board and do not see it as a burden but a challenge to make something great, even better. &lt;br /&gt;
&lt;br /&gt;
== '''References''' ==&lt;br /&gt;
'''John Doherty Msc Security &amp;amp; Forensic Computing'''&lt;br /&gt;
&lt;br /&gt;
Owen was my lecturer for Security in NCI. His class and teaching made me seek a further interest in the cyber security field. Even after college I kept in touch with him and he gave me advice and encouraged me to do a masters in security in DCU. &lt;br /&gt;
&lt;br /&gt;
Since then Owen pointed me to the OWASP mailing list which keeps me updated on chapter meetings which I regularly attend and also cyber security job postings and courses. The speakers that have attended have been very interesting and informative. &lt;br /&gt;
&lt;br /&gt;
Owen is now advising/helping me with my DCU masters practicum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''‪Mark Denihan OWASP Security Shepherd Project Lead'''&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''Fabio Cerullo Managing Director at Cycubix'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
‪'''Jason flood CTO of Security Gamification at IBM'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=254164</id>
		<title>User:Owen Pendlebury</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=254164"/>
				<updated>2019-08-26T14:41:50Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OwenPendlebury.jpg|left|]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Owen graduated in 2009 from Dundalk Institute of Technology, with a degree in Computer Applications and Support and an honours degree in IT Management specialising in web application development and networking. In 2009, Owen completed an MSc in Security &amp;amp; Forensic Computing from Dublin City University.&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and led the Dublin Chapter of the Open Web Application Security Project (OWASP) organisation. In 2017 was elected to its Global Board of Directors where he held the role of Secretary and recently Vice-Chair of the global foundation. In 2016, Owen was awarded an OWASP Web Application Person of the Year (WASPY) award for Innovation and Sharing. &lt;br /&gt;
&lt;br /&gt;
Some of the projects that Owen has been involved in include, AppSec EU 2016/2017/2018/2019 Committee/ Training/ Speaker Committee chair, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars, speaking on behalf of OWASP at BlackHat USA and EU, Cyber Security Summer Camp for school kids and OWASP Women in AppSec Committee/ mentoring. &lt;br /&gt;
&lt;br /&gt;
Owen has over 10 years’ experience in penetration testing and red teaming, working as part of several global Attack and Penetration Teams at “Big 4” professional service firms. He currently leads the penetration testing and red teaming teams for Deloitte Ireland and has in-depth experience of application, network, wireless and device penetration testing, having served numerous local and global institutions as clients in this area. Within Deloitte, Owen acts as vulnerability management lead for the EMEA region, setting the strategic direction, quality standards and deliverables for vulnerability management across EMEA. As part of this role, Owen has brought his colleagues from both EMEA and across the globe together to collaborate on innovative projects as well as client pitches. &lt;br /&gt;
&lt;br /&gt;
He also lectures and sits on the computer science program boards at the National College of Ireland (NCI) in web application, network security, and secure application development. In 2017, Owen was approached to architect a MSc, Degree and HDip in cyber security for NCI and has been working actively in supporting the bridge between academia and industry. He is also a keen advocate of diversity in cyber security and takes an active role in supporting the OWASP Women in AppSec group through mentoring and working with those who are trying to get into the field. &lt;br /&gt;
&lt;br /&gt;
Owen has also performed numerous web application, network, mobile, specialised technologies (ATM), device penetration tests for major organisations in the financial services, banking and pharmaceutical sectors, consisting of ‘black-box’, ‘white-box’ and ‘grey-box’ testing.  &lt;br /&gt;
&lt;br /&gt;
'''References'''&lt;br /&gt;
&lt;br /&gt;
'''John Doherty Msc Security &amp;amp; Forensic Computing'''&lt;br /&gt;
&lt;br /&gt;
Owen was my lecturer for Security in NCI. His class and teaching made me seek a further interest in the cyber security field. Even after college I kept in touch with him and he gave me advice and encouraged me to do a masters in security in DCU. &lt;br /&gt;
&lt;br /&gt;
Since then Owen pointed me to the OWASP mailing list which keeps me updated on chapter meetings which I regularly attend and also cyber security job postings and courses. The speakers that have attended have been very interesting and informative. &lt;br /&gt;
&lt;br /&gt;
Owen is now advising/helping me with my DCU masters practicum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''‪Mark Denihan OWASP Security Shepherd Project Lead'''&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''Fabio Cerullo Managing Director at Cycubix'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
‪'''Jason flood CTO of Security Gamification at IBM'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253539</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253539"/>
				<updated>2019-08-05T18:56:38Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: updating the wording of cliff notes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
[[File:ProcessFlowCommittee2.0.png|thumb|Process Flow Committee 2.0]]&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets three applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The required roles for a committee board are: &lt;br /&gt;
* Chair:  &lt;br /&gt;
* Vice-Chair; and  &lt;br /&gt;
* Secretary.   &lt;br /&gt;
&lt;br /&gt;
Other roles that a committee board can be made up of, but are not limited to, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253538</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253538"/>
				<updated>2019-08-05T18:54:39Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
[[File:ProcessFlowCommittee2.0.png|thumb|Process Flow Committee 2.0]]&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets three applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The required roles for a committee board are Chair, Vice-Chair and Secretary. Other roles that a committee board can be made up of, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
* PR/Marketing  &lt;br /&gt;
* Web  &lt;br /&gt;
* Membership &lt;br /&gt;
* Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253537</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253537"/>
				<updated>2019-08-05T18:53:10Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
[[File:ProcessFlowCommittee2.0.png|thumb|Process Flow Committee 2.0]]&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets three applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The required roles for a committee board are Chair, Vice-Chair and Secretary. Other roles that a committee board can be made up of can be, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
* PR/Marketing  &lt;br /&gt;
* Web  &lt;br /&gt;
* Membership &lt;br /&gt;
* Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253536</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253536"/>
				<updated>2019-08-05T18:29:28Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
[[File:ProcessFlowCommittee2.0.png|thumb|Process Flow Committee 2.0]]&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets three applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The roles for a committee board can be, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
*Secretary  &lt;br /&gt;
* PR/Marketing  &lt;br /&gt;
* Web  &lt;br /&gt;
* Membership &lt;br /&gt;
* Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253535</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=253535"/>
				<updated>2019-08-05T18:28:54Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
[[File:ProcessFlowCommittee2.0.png|thumb|Process Flow Committee 2.0]]&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets three applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The roles for a committee board can be but are not limited to: &lt;br /&gt;
&lt;br /&gt;
*Secretary  &lt;br /&gt;
* PR/Marketing  &lt;br /&gt;
* Web  &lt;br /&gt;
* Membership &lt;br /&gt;
* Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=May_2019&amp;diff=251762</id>
		<title>May 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=May_2019&amp;diff=251762"/>
				<updated>2019-05-21T12:03:41Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Meeting Date:&lt;br /&gt;
May 20&lt;br /&gt;
&lt;br /&gt;
Meeting Time:&lt;br /&gt;
11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=5&amp;amp;day=20&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
Meeting Location:&lt;br /&gt;
Remote&lt;br /&gt;
&lt;br /&gt;
Virtual: &lt;br /&gt;
[https://zoom.us/j/282821949 Zoom Meeting Link]  Meeting ID: 282 821 949 - [https://zoom.us/u/kvUg3969 local dial in numbers]&lt;br /&gt;
&lt;br /&gt;
 AGENDA&lt;br /&gt;
1, Conference Update (TelAviv, Amsterdam and DC)&lt;br /&gt;
&lt;br /&gt;
2, Open Security Summit Update/ Project funding&lt;br /&gt;
&lt;br /&gt;
3, Staffing requirements/ plans&lt;br /&gt;
&lt;br /&gt;
4, Website/ Internal Procedures/ Service Catalog update&lt;br /&gt;
&lt;br /&gt;
5, Update on Trademarks&lt;br /&gt;
&lt;br /&gt;
6, Update on next face to face meeting&lt;br /&gt;
&lt;br /&gt;
7, Update on projects and chapters&lt;br /&gt;
 &lt;br /&gt;
 CALL TO ORDER&lt;br /&gt;
&lt;br /&gt;
 CHANGES TO THE AGENDA&lt;br /&gt;
&lt;br /&gt;
 APPROVAL OF MINUTES&lt;br /&gt;
 [https://docs.google.com/document/d/1OBSxgWMKSZgfcfS7eQPrdCzDEgeINqhFWenuCkaO4ZM/edit?usp=sharing April 2019 Minutes]&lt;br /&gt;
&lt;br /&gt;
 REPORTS&lt;br /&gt;
&lt;br /&gt;
 OLD BUSINESS&lt;br /&gt;
&lt;br /&gt;
 NEW BUSINESS&lt;br /&gt;
&lt;br /&gt;
 COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS&lt;br /&gt;
&lt;br /&gt;
 ADJOURNMENT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&lt;br /&gt;
&lt;br /&gt;
==Old Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
==New Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=May_2019&amp;diff=251761</id>
		<title>May 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=May_2019&amp;diff=251761"/>
				<updated>2019-05-21T12:03:12Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Meeting Date:&lt;br /&gt;
May 20&lt;br /&gt;
&lt;br /&gt;
Meeting Time:&lt;br /&gt;
11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=5&amp;amp;day=20&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
Meeting Location:&lt;br /&gt;
Remote&lt;br /&gt;
&lt;br /&gt;
Virtual: &lt;br /&gt;
[https://zoom.us/j/282821949 Zoom Meeting Link]  Meeting ID: 282 821 949 - [https://zoom.us/u/kvUg3969 local dial in numbers]&lt;br /&gt;
&lt;br /&gt;
 AGENDA&lt;br /&gt;
1, Conference Update (TelAviv, Amsterdam and DC)&lt;br /&gt;
2, Open Security Summit Update/ Project funding&lt;br /&gt;
3, Staffing requirements/ plans&lt;br /&gt;
4, Website/ Internal Procedures/ Service Catalog update&lt;br /&gt;
5, Update on Trademarks&lt;br /&gt;
6, Update on next face to face meeting&lt;br /&gt;
7, Update on projects and chapters&lt;br /&gt;
 &lt;br /&gt;
 CALL TO ORDER&lt;br /&gt;
&lt;br /&gt;
 CHANGES TO THE AGENDA&lt;br /&gt;
&lt;br /&gt;
 APPROVAL OF MINUTES&lt;br /&gt;
 [https://docs.google.com/document/d/1OBSxgWMKSZgfcfS7eQPrdCzDEgeINqhFWenuCkaO4ZM/edit?usp=sharing April 2019 Minutes]&lt;br /&gt;
&lt;br /&gt;
 REPORTS&lt;br /&gt;
&lt;br /&gt;
 OLD BUSINESS&lt;br /&gt;
&lt;br /&gt;
 NEW BUSINESS&lt;br /&gt;
&lt;br /&gt;
 COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS&lt;br /&gt;
&lt;br /&gt;
 ADJOURNMENT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&lt;br /&gt;
&lt;br /&gt;
==Old Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
==New Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Board&amp;diff=250758</id>
		<title>Board</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Board&amp;diff=250758"/>
				<updated>2019-04-29T09:43:49Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= Board Meetings =&lt;br /&gt;
[https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Bylaws] are the most important legal document of any organization. Bylaws outline in writing the day-to-day rules for your organization and provide comprehensive guidelines to keep things running smoothly. If you want to understand the business of OWASP Foundation the best way to do that would be to examine the bylaws the the [https://www.owasp.org/index.php/About_OWASP#Form_990_Documents 990 forms filed with the United States Government as a non-profit annually.]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Global Bylaws]&lt;br /&gt;
&lt;br /&gt;
== Upcoming 2019 Meetings ==   &lt;br /&gt;
* [[April 2019 |April 29, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=4&amp;amp;day=15&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[May 2019 |May 21, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=5&amp;amp;day=20&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[June 2019 |June 18,  2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=6&amp;amp;day=17&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[July 2019 |July 16, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=7&amp;amp;day=15&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[August 2019 |August 20, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=8&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[September 2019 |September 17, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=9&amp;amp;day=16&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[October 2019 |October 22, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=10&amp;amp;day=21&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[November 2019 |November 29, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=11&amp;amp;day=18&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[December 2019 |December 24, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=12&amp;amp;day=23&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
All board meeting notes that include actions as a result will be tracked in a single document for all meetings [https://docs.google.com/a/owasp.org/document/d/1aPmftVZH3-G96J6-wrpynwwZhBHtREe5a7g8owVYUag/edit?usp=sharing click here]&lt;br /&gt;
&lt;br /&gt;
== 2018 Elected by Membership, Global Board Members == &lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Member, Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History Historical Board Members by Year]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:Knoblochmartin | Martin Knobloch]]:  Chair  ====&lt;br /&gt;
&lt;br /&gt;
The Chairman of the Board shall serve as the principal executive officer of the Foundation.&lt;br /&gt;
&lt;br /&gt;
Fiduciary responsibilities: He/She shall, in general, supervise and control all of the business and affairs of the Foundation. He/She will monitor financial planning and financial reports He/She or he may sign, with the Secretary or any other proper officer of the Foundation thereunto authorized by the Board of Directors, any deeds, mortgages, bonds, contracts, or other instruments which the Board of Directors has authorized to be executed, except in cases where the signing and execution thereof shall be expressly delegated by the Board of Directors or by these Bylaws to some other officer or agent of the Foundation, or shall be required by law to be otherwise signed or executed;&lt;br /&gt;
&lt;br /&gt;
Leadership and Direction: provides leadership to the Board of Directors with regards to policy setting and strategic planning. He/She helps guide and mediate board actions with respect to organizational priorities and governance concerns, and in general shall perform all duties incident to the office of Chairman of the Board subject to the control of the Board of Directors.&lt;br /&gt;
&lt;br /&gt;
Organizational Responsibilities: He/She plays a leading role in fundraising activities, formally evaluate the performance of the Foundation Director and informally evaluate the effectiveness of the board members. An annual, overall evaluation of the performance of the organization in achieving its mission will be accomplished. He or she shall, when present, preside at all meetings of the Board of Directors, unless otherwise delegated, and such other duties as may be prescribed by the Board of Directors from time to time. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====  [[Owen_Pendlebury_2017_Bio_%26_Why_Me%3F | Owen Pendlebury]]:  Vice Chair ====&lt;br /&gt;
&lt;br /&gt;
Performs Chair responsibilities when the Chair cannot be available, works closely with Chair and other Board Members, participates closely with Chair to develop and implement officer transition plans, performs other responsibilities as assigned by the Board.&lt;br /&gt;
­&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[Sherif_Mansour_2017_Bio_%26_Why_Me%3F | Sherif Mansour]]: Treasurer==== &lt;br /&gt;
&lt;br /&gt;
Treasurer ­manages finances of the organization, administers fiscal matters of the organization, provides annual budget to the board for member’s approval, ensures development and board review of financial policies and procedures. [[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:Ofer_Maor | Ofer Maor]]: Secretary ====&lt;br /&gt;
&lt;br /&gt;
Maintains records of the board and ensures effective management of organization’s records, manages minutes of board meetings, ensures minutes are distributed shortly after each meeting, is sufficiently familiar with legal documents (articles, by­laws, IRS letters, etc.) to note applicability during meetings; is the custodian of the corporate records and of the seal of the Foundation and see that the seal of the Foundation is affixed to all documents, the execution of which on behalf of the Foundation under its seal is duly authorized; keeps a register of the post office address of each Director which shall be furnished to the Secretary by such Director; and, in general perform all duties incident to the office of the Secretary and such other duties as from time to time may be assigned to him by the Chairman of the Board or by the Board. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[Chenxi_Wang,_Ph.D._(Forrester_Research) | Chenxi Wang, Ph.D.]]:  Member at Large====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&lt;br /&gt;
==== [[User:Richard_greenberg | Richard Greenberg]]:  Member at Large ====&lt;br /&gt;
&amp;lt;br&amp;gt;Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====[[Gary_Robinson_2018_Bio_and_Why_me | Gary Robinson]]:  Member at Large ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Meetings Operate =&lt;br /&gt;
'''CALL TO ORDER'''&lt;br /&gt;
&lt;br /&gt;
The first order of business is for the chair to announce the call to order, along with the time. The secretary enters the time of the call to order in the minutes. After the meeting is called to order, the board chair may make welcoming remarks, ask for introductions, or read the organization’s mission and vision statements.&lt;br /&gt;
&lt;br /&gt;
'''CHANGES TO THE AGENDA'''&lt;br /&gt;
&lt;br /&gt;
The second order of business is for the chair to ask for changes to the agenda. Additions and deletions to the agenda will be made at this time. Having no changes, the agenda moves to approving the prior meeting’s minutes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''APPROVAL OF MINUTES'''&lt;br /&gt;
&lt;br /&gt;
The third item on the agenda should list “Approval of Minutes” along with the date of the most recent meeting. In most cases, board members should have received a copy of the minutes prior to the meeting. If they have not contacted the secretary prior to the meeting with corrections or changes to the minutes, they have to opportunity to make them during this item on the agenda.&lt;br /&gt;
&lt;br /&gt;
Board members have an ethical and legal responsibility to make sure that the recording of the minutes accurately reflect the board’s business.&lt;br /&gt;
&lt;br /&gt;
'''REPORTS'''&lt;br /&gt;
&lt;br /&gt;
The fourth item on the agenda is the reports. This first report should be a report from the Executive Director. This report should include a review of operations and projects. The Executive Director should give board members on overview of the business outlook including positive and negative trends, major initiatives, business updates, and other aspects of the business.&lt;br /&gt;
&lt;br /&gt;
Following the Executive Director report, the Finance Director gives a report. Board members should make an effort to understand the financial reports so that they can identify potential financial threats. Understanding financial reports may also generate discussion about potential opportunities.&lt;br /&gt;
&lt;br /&gt;
Subsequent reports may be given by committee chairs.&lt;br /&gt;
&lt;br /&gt;
'''OLD BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Items should include past business items that are unresolved, need further discussion, or require a board vote. Items may be tabled or referred to committee for further exploration.&lt;br /&gt;
&lt;br /&gt;
'''NEW BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Board members should have a discussion about new business items and identify a plan to take action. This may include tabling them, delaying action to a future date, or referring them to a committee.&lt;br /&gt;
&lt;br /&gt;
'''COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
At this point in the agenda, members may make announcements, such as offering congratulations or condolences, or make other special announcements. Any other business may be brought up at this time, for example, items that may need to be added to the next meeting’s agenda.&lt;br /&gt;
&lt;br /&gt;
'''ADJOURNMENT'''&lt;br /&gt;
&lt;br /&gt;
This is a formal closing of the meeting by the board chair. He should state the time that the meeting closed, so that the secretary may including it in the board minutes. The date of the next meeting should follow the adjournment item, so that board members will be reminded to put it on their calendars.&lt;br /&gt;
&lt;br /&gt;
For more information about the Roberts Rules of Order see this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
= Voting History =&lt;br /&gt;
&lt;br /&gt;
=== Historical Votes on Motions ===&lt;br /&gt;
The purpose of this is to track the position on each motion as presented and how the elected official voted on the motion. This is useful for the membership to review how elected officials voted on items that effect the organization and its [https://www.owasp.org/index.php/OWASP_Foundation_ByLaws bylaws]. A motion is a request for action (budget requests, policy changes, new partnerships etc.) they can be presented by ANYONE to the board such as a member of the public, a member of the OWASP Foundation but does require a sponsor on the Board.  That sponsor will present the motion to the board at least (10) working days in advance so it can be read in advance of the meeting.  If appropriate a motion can be presented based to take action on the motion as written. For a vote to be called and action to be taken a second board member is required to carry the business to vote. On completion of the discussion the chairman will call for a vote to the motion YES, NO, ABSTAIN. For more details on this process try this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/OWASP_Board_Votes Historical Board Votes]&lt;br /&gt;
&lt;br /&gt;
Note that if a motion is presented and is voted on and it is approved action will be taken to implement the motion.  If the motion fails it can be resubmitted and the process starts again as if it is a new motion.&lt;br /&gt;
&lt;br /&gt;
=== Attendance Tracker===&lt;br /&gt;
This is used to keep track that Board Members meet 75% attendance requirements as noted in section 3.03 of the organization bylaws. A meeting is logged as attended if the board member attends the entire meeting as scheduled from the call to order until it is adjourned, this includes executive session if applicable that is closed to the membership and general public for reasons related to human resources and legal issues that require it by law or for the good of the OWASP Foundation Inc. - &lt;br /&gt;
 [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracker]&lt;br /&gt;
&lt;br /&gt;
= Historical Meeting Archive =&lt;br /&gt;
== Archive 2019 ==&lt;br /&gt;
* [[March 2019 |March 18,  2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=3&amp;amp;day=18&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[February 2019 |February 18, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=2&amp;amp;day=18&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp; other time zones]&lt;br /&gt;
* [[January 2019 |January 23rd, 2019]] - 3:00 PM to 4:00 PM PST([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=1&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
&lt;br /&gt;
== Archive 2018 ==&lt;br /&gt;
* [[December 2018 |December 19th, 2018]] - 1:00 PM to 2:30 PM EST ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=12&amp;amp;day=19&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
* [[November 2018 |November 21, 2018]] - 12:00 PM to 1:30 PM EST ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=11&amp;amp;day=21&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
* [[October 2018 |October 10, 2018]] - 3:00 to 4:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=10&amp;amp;day=10&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) at AppSec USA 2018 Conference&lt;br /&gt;
* [[September 2018 |September 27, 2018]] - 2:00 PM to 3:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=9&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) &lt;br /&gt;
* [[August 2018 |August 15, 2018]] - 1:00 PM to 2:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=8&amp;amp;day=15&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) &lt;br /&gt;
* [[July 4th, 2018|July 4th, 2018]] - during AppSec EU 2018&lt;br /&gt;
* [[June_19,_2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=6&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 Click Here for Meeting Time in Your Timezone]&lt;br /&gt;
* [[May 15, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=5&amp;amp;day=15&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 Click Here for Meeting Time in Your Timezone]&lt;br /&gt;
* [[April 4, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=4&amp;amp;day=4&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 TimeZone Converter]&lt;br /&gt;
* [[March 7, 2018]] - 3:00pm - 4:00pm EST - [https://www.timeanddate.com/worldclock/converted.html?iso=20180307T21&amp;amp;p1=16&amp;amp;p2=16&amp;amp;p3=676&amp;amp;p4=136&amp;amp;p5=78&amp;amp;p6=179&amp;amp;p7=224&amp;amp;p8=240&amp;amp;p9=102 Time Converter]&lt;br /&gt;
* [[February 7, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=2&amp;amp;day=7&amp;amp;hour=20&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=179&amp;amp;p3=78&amp;amp;p4=102&amp;amp;p5=224&amp;amp;p6=136&amp;amp;p7=152&amp;amp;p8=676 TimeZone Converter]&lt;br /&gt;
* [[January 24, 2018]], [https://www.timeanddate.com/worldclock/fixedtime.html?msg=OWASP+Board+Meeting%2C+January+24+2018&amp;amp;iso=20180124T19&amp;amp;p1=16&amp;amp;ah=1&amp;amp;am=30 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive 2017 ==&lt;br /&gt;
* [[December 6, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=12&amp;amp;day=06&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2017]], 07:00-08:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=11&amp;amp;day=8&amp;amp;hour=15&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[October 11, 2017]],  15:00 - 17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 19, 2017]] 15:00-17:30 PDT, in Orlando at AppSecUSA - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=9&amp;amp;day=19&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 6, 2017]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=09&amp;amp;day=06&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] (Cancelled for interviews)&lt;br /&gt;
*[[August 9, 2017]], 16:00-17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=08&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[July 5, 2017]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=07&amp;amp;day=05&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[June 7, 2017]], 18:00-21:00 CEST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=06&amp;amp;day=07&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[May 9, 2017]],  18:00-19:30 IST, in Belfast at AppSecEU - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=5&amp;amp;day=9&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[April 12, 2017]], 16:00-17:00 PDT - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=04&amp;amp;day=12&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]  ('''Cancelled''' [http://lists.owasp.org/pipermail/owasp-board/2017-April/017969.html Notice by Matt Konda])&lt;br /&gt;
*[[March 22, 2017]] 06:00-07:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=3&amp;amp;day=22&amp;amp;hour=13&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] - *Special Meeting to approve the 2017 Budget*&lt;br /&gt;
* [[March 8, 2017]], 06:00-07:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=03&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 8, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=02&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 11, 2017]], 14:00-15:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=1&amp;amp;day=10&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2016 Meetings ==&lt;br /&gt;
* [[December 14, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=12&amp;amp;day=14&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* CANCELLED - [[November 30, 2016]], 15:00-16:30 PST - placeholder only optional if needed - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=30&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[October 11, 2016]], at AppSecUSA 18:00 - 21:00 EDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[September 21, 2016]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=09&amp;amp;day=21&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[August 23, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=08&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 1, 2016]], 18:00-21:00 CEST, in Rome at AppSecEU - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=01&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 27, 2016]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=27&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[May 18, 2016]],  07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=05&amp;amp;day=18&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[April 20, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=04&amp;amp;day=20&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[March 16, 2016]], 16:00-17:00 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=03&amp;amp;day=16&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 17, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=02&amp;amp;day=17&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 13, 2016]], 16:00-17:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=01&amp;amp;day=14&amp;amp;hour=00&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2015 Meetings ==&lt;br /&gt;
* [[December 9, 2015]], 15:00-17:00 PST &lt;br /&gt;
* [[November 18, 2015]], 14:00-15:30 PST&lt;br /&gt;
* [[November 4, 2015]], 12:00-13:30 PST&lt;br /&gt;
* [[October 14, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[September 25, 2015]] at AppSecUSA 18:00 - 20:00 PST&lt;br /&gt;
* [[August 12, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[July 22, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[June 24, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[May 22, 2015]],  18:00-20:00 CEST in Amsterdam @ AppSec-EU , 9:00am-11:00am PST;&lt;br /&gt;
* [[April 29, 2015]], 12:00-13:00 PST&lt;br /&gt;
* [[March 25, 2015]], 12:00-13:00 PST &lt;br /&gt;
* [[February 11, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[January 14, 2015]], 9am-10am PST&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive for 2014 Meetings ==&lt;br /&gt;
* [[December 10, 2014]], 9am-10am PST&lt;br /&gt;
* [[November 12, 2014]], 9am - 10am PST&lt;br /&gt;
* [[October 8, 2014]], 9am-10am PST&lt;br /&gt;
* [[September 16, 2014]], 6pm - 9pm MST, In person at Appsec USA &lt;br /&gt;
* [[August 13, 2014]], 9am-10am PST&lt;br /&gt;
* [[July 9, 2014]], 9am-10am PST&lt;br /&gt;
* [[June 27, 2014]], 8am - 4 pm BST, In person at AppSec Europe&lt;br /&gt;
* [[April 30, 2014]],9am - 12pm PST&lt;br /&gt;
* [[March 3, 2014]], 7am - 10am PST&lt;br /&gt;
* [[February 24, 2014]], 8am - 10am PST&lt;br /&gt;
&lt;br /&gt;
== Archive for 2013 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[December 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
* December 2, 2013 - Special Board Meeting - [https://docs.google.com/spreadsheet/ccc?key=0ApZ9zE0hx0LNdGdJZ1BIaEZkc2V1QV81NmJ4dnI0R1E&amp;amp;usp=sharing 2014 Budget] walk through, Q &amp;amp; A (no meeting notes)&lt;br /&gt;
&lt;br /&gt;
*[[November 22, 2013]] - In person meeting at AppSec USA - New York, NY&lt;br /&gt;
&lt;br /&gt;
* November 11, 2013 - cancelled due to in person meeting on Nov. 22&lt;br /&gt;
&lt;br /&gt;
*[[October 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[September 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[In person meeting at AppSec EU - Hamburg, Germany; August 19-24]]&lt;br /&gt;
&lt;br /&gt;
* August 12, 2013 - canceled due to in person meeting on Aug 19&lt;br /&gt;
&lt;br /&gt;
*[[July 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[June 10, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 31, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 13, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[April 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[March 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[February 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[January 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2012 Meetings ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation [https://www.owasp.org/images/a/ae/2012ByLawsFINAL.pdf ByLaws]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Global_Committee_Pages Global Committees] &lt;br /&gt;
&lt;br /&gt;
*[[January 9, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 6, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 15, 2012]] &lt;br /&gt;
&lt;br /&gt;
*[[March 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[April 5, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[May 14,2012]]&lt;br /&gt;
&lt;br /&gt;
*[[June 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Aug 13, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Sept 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 8, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 24, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 26, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
*[[Dec 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Dec 27, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
== Archive for 2011 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[March 7, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[April_4_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[May_2_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[June 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[August 8, 2011]] &lt;br /&gt;
&lt;br /&gt;
*[[September 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 20, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 22, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[October 10, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[November 14, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[December 5, 2011]]&lt;br /&gt;
&lt;br /&gt;
== Minutes for 2011 Meetings ==  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Votes Historical]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[Minutes January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes March 8, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 4, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 2, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VD9ZHEwht9tmM8FKEQ6DBrtmL_gTAhSSnQhiFXYkJ7I/edit?hl=en_US&amp;amp;authkey=CIavkP4B June 6 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VMwYrP6owtZ-SchBxUcWTIF-ITvzUX8PjUkLPwr2ipg/edit?hl=en_US&amp;amp;authkey=CIGTx5sD July 11 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1CLu9aQpS7LdeX87rJ5N9cuJ-RGGVzDWf34l6gdMml7M/edit?hl=en_US&amp;amp;authkey=CI-U5qEP August 8, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1HM32VcvWb0hizD5_mhWMULLaouzuRgA3ZYjODRZwyAs/edit?hl=en_US September 6, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1Y-8tZisUZM5ZKP8AxJqvkiNtFanVFM0m--bMG2PZ3ww/edit October 10, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/13-aHX2pSUXjCP8ivsbls6u1VX1BVSYewyMUH8LI7zpQ/edit November 14, 2011]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2010 Meetings ==&lt;br /&gt;
*[[January 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[February 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]] &amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;Postponed until March 9, 2010&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[[April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[May 4, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[August 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[September 8, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[December_6_2010]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2010 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[Jan 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Feb 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes_December_6,_2010]]&lt;br /&gt;
&lt;br /&gt;
*[[OWASP Board Meetings January Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings February Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June 09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting July 7, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting August 4, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting September 1, 2009 Agenda]] &lt;br /&gt;
*[[OWASP Board Meeting October 6, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting November 10, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting December 1, 2009 Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2009 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 01-06-09]]&lt;br /&gt;
* [[OWASP Board Meetings 02-03-09]]&lt;br /&gt;
* [[OWASP Board Meetings 03-10-09]]&lt;br /&gt;
* [[OWASP Board Meetings April 09]]&lt;br /&gt;
* [[OWASP Board Meetings May 09]]&lt;br /&gt;
* [[OWASP Board Meetings June 09]]&lt;br /&gt;
* [[OWASP Board Meeting July 09]]&lt;br /&gt;
* [[OWASP Board Meeting August 09]]&lt;br /&gt;
* [[OWASP Board Meeting September 09]]&lt;br /&gt;
* [[OWASP Board Meeting October 09]]&lt;br /&gt;
* [[OWASP Board Meeting December 09]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2008 Meetings ==&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings July Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings August Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings September Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings October Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings December Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2008 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 2-7-08]]&lt;br /&gt;
* [[OWASP Board Meetings 3-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 5-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 6-3-08]]&lt;br /&gt;
* [[OWASP Board Meetings 8-14-08]]&lt;br /&gt;
* [[OWASP Board Meetings 9-2-08]] &lt;br /&gt;
* [[Owasp Board Meetings 10-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 11-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 12-02-08]]&lt;br /&gt;
&lt;br /&gt;
= Board Election Archive =&lt;br /&gt;
&lt;br /&gt;
All elected officers are required to [https://docs.google.com/document/d/10zBT6oY2Q3B6kr6r7DGl3Cc0f5rGmQ0Slc6RYvbxmus/edit review sign and return] the following document before starting their term in office to the then current board Secretary &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History OWASP Board History]&lt;br /&gt;
&lt;br /&gt;
===2017 Election===&lt;br /&gt;
[https://www.owasp.org/index.php/2017_Global_Board_of_Directors_Election 2017 Board Election]&lt;br /&gt;
=== 2016 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2016_Global_Board_of_Directors_Election 2016 Board Election]&lt;br /&gt;
=== 2015 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2015_Global_Board_of_Directors_Election 2015 Board Election]&lt;br /&gt;
=== 2014 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2014_Board_Elections 2014 Board Election]&lt;br /&gt;
=== 2013 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2013_Board_Elections 2013 Board Election]&lt;br /&gt;
=== 2012 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2012_Election 2012 Board Election]&lt;br /&gt;
=== 2011 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2011Election 2011 Board Election]&lt;br /&gt;
=== 2009 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Board_Election_2009 2009 Board Election]&lt;br /&gt;
&lt;br /&gt;
=== Past OWASP Boards ===&lt;br /&gt;
&lt;br /&gt;
[[Board-2018]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2017]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2016]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2015]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2014]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2013]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2012]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2011]]&lt;br /&gt;
&lt;br /&gt;
= Misc. =&lt;br /&gt;
&lt;br /&gt;
* Teleconference Information: **CHECK MEETING INFORMATION**&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/International_Toll_Free_Calling_Information International Toll Free Calling Info]&lt;br /&gt;
&lt;br /&gt;
* Meeting Template found [https://www.owasp.org/index.php/Board-Meeting-template here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt; &amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249867</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249867"/>
				<updated>2019-04-09T14:26:31Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
[[File:ProcessFlowCommittee2.0.png|thumb|Process Flow Committee 2.0]]&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets five applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The minimum required roles for a committee board are: &lt;br /&gt;
&lt;br /&gt;
*Secretary  &lt;br /&gt;
* PR/Marketing  &lt;br /&gt;
* Web  &lt;br /&gt;
* Membership &lt;br /&gt;
* Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249866</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249866"/>
				<updated>2019-04-09T14:23:59Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets five applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The minimum required roles for a committee board are: &lt;br /&gt;
*** Secretary  &lt;br /&gt;
*** PR/Marketing  &lt;br /&gt;
*** Web  &lt;br /&gt;
*** Membership &lt;br /&gt;
*** Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:ProcessFlowCommittee2.0.png|thumb|Process Flow Committee 2.0]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249865</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249865"/>
				<updated>2019-04-09T14:22:46Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets five applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The minimum required roles for a committee board are: [[File:ProcessFlowCommittee2.0.png|thumb|Process Flow Committee 2.0]]&lt;br /&gt;
*** Secretary  &lt;br /&gt;
*** PR/Marketing  &lt;br /&gt;
*** Web  &lt;br /&gt;
*** Membership &lt;br /&gt;
*** Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249864</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249864"/>
				<updated>2019-04-09T14:21:37Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets five applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The minimum required roles for a committee board are: &lt;br /&gt;
*** Secretary  &lt;br /&gt;
*** PR/Marketing  &lt;br /&gt;
*** Web  &lt;br /&gt;
*** Membership &lt;br /&gt;
*** Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&lt;br /&gt;
[[File:ProcessFlowCommittee2.0.png|thumb|Process Flow Committee 2.0]]&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ProcessFlowCommittee2.0.png&amp;diff=249863</id>
		<title>File:ProcessFlowCommittee2.0.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ProcessFlowCommittee2.0.png&amp;diff=249863"/>
				<updated>2019-04-09T14:21:03Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Image depicting the process flow&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249861</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249861"/>
				<updated>2019-04-09T14:18:15Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
If an OWASP member wants to create a new OWASP committee the process for that is as follows: &lt;br /&gt;
&lt;br /&gt;
1.    The member must circulate the proposed committee, firstly through the OWASP mailing list. Optionally the member can use other mediums such as Slack so that more community members can lend support to the proposal. This proposal must state the rationale and the desired scope for the creation of the new committee. &lt;br /&gt;
&lt;br /&gt;
2.     The proposal must get majority support from those who responded to any communications about it and no major arguments against it. &lt;br /&gt;
&lt;br /&gt;
3.     If the previous requirement is met the OWASP Board of Directors will determine whether the committee and its scope is in line with OWASP’s goals and if any conflicts exist with other committees.&lt;br /&gt;
&lt;br /&gt;
4.    If no conflict exists, the proposal will be discussed at the next Board of Directors meeting. This will involve community discussion and a vote on its formation. &lt;br /&gt;
&lt;br /&gt;
5.     If a majority vote is established, the Board of Directors will put out a public call for any OWASP members interesting in committee membership, with a 4 week time period. &lt;br /&gt;
&lt;br /&gt;
6.    If the committee gets five applications to join the new committee and creates a board to head up the new committee, then its proposal will be deemed successful and the committee is created. The minimum required roles for a committee board are: &lt;br /&gt;
*** Secretary  &lt;br /&gt;
*** PR/Marketing  &lt;br /&gt;
*** Web  &lt;br /&gt;
*** Membership &lt;br /&gt;
*** Finance &amp;amp; Meetings/Conferences &lt;br /&gt;
&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249857</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=249857"/>
				<updated>2019-04-09T13:24:01Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion, with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=247430</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=247430"/>
				<updated>2019-02-13T16:42:10Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: formatting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== '''OWASP Global Committees 2.0 Operational Model''' ==&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
== '''I. Introduction''' ==&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
== '''II. High-Level Proposal''' ==&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
== '''III. Committee Creation''' ==&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion , with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
* Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
== '''IV. Committee Scope''' ==&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
=== '''Conflict''' ===&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''V. Committee Membership''' ==&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
# Individual must be an OWASP member in good standing; or&lt;br /&gt;
# Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
# Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
=== '''Lack of Participation''' ===&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
== '''VI. OWASP Staff Participation''' ==&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
== '''VII. OWASP Board Participation''' ==&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
== '''VIII. Committee Communication''' ==&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''IX. Committee Organization''' ==&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
== '''X. Committee Removal''' ==&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
== '''XI. Empowerment''' ==&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
# The action is within the predetermined scope of the committee;&lt;br /&gt;
# The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
# If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
# No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
# The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
# If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
== '''XII. Accountability''' ==&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
== '''XIII. Conclusion''' ==&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=247429</id>
		<title>Governance/OWASP Committees</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/OWASP_Committees&amp;diff=247429"/>
				<updated>2019-02-13T16:38:10Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: Updated to the latest version of the doc&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Global Committees 2.0 Operational Model'''&lt;br /&gt;
&lt;br /&gt;
Passed by a vote of the OWASP Board of Directors on December 19, 2018.&lt;br /&gt;
&lt;br /&gt;
'''I. Introduction'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Global Committees empower members of the community to help shape OWASP and make the best decisions for the Foundation. The goal of the Global Committees 2.0 plan is to streamline the process for any member of the OWASP community who has an idea to improve the Foundation, to have a vehicle to act upon the idea and successfully implement it.&lt;br /&gt;
&lt;br /&gt;
'''II. High-Level Proposal'''&lt;br /&gt;
&lt;br /&gt;
OWASP’s committees participate in key aspects of our Foundation. This may include Chapters, Projects, Conferences, Governance, and other topics to be determined later. The key difference between the proposed committees and those of OWASP past will be in the empowerment to take action. OWASP believes that Committees should be empowered to vote on change , at any time, that is within the stated scope of the committee. If a committee wishes to change their scope, the committee should add the proposed change to the next BoD meeting for discussion. Once the BoD approves this change, the committee should bring the proposed change to the OWASP Community for feedback.&lt;br /&gt;
&lt;br /&gt;
'''III. Committee Creation'''&lt;br /&gt;
&lt;br /&gt;
At any point in time, a community member may propose a new committee via the OWASP mailing lists including other mediums such as slack to ensure greater community coverage,stating their rationale and the desired scope for creating a new committee. After this discussion , with majority support from those who responded on these communications and no major arguments against, the OWASP Board of Directors (BoD) will determine whether there is a conflict of interest with any existing committees and whether the formation of that committee and its desired scope is in line with OWASP’s goals.&lt;br /&gt;
&lt;br /&gt;
If no conflict is determined to exist, the Board, at the next BoD meeting will invite community discussion and vote on its formation.  Once a majority vote is established, the BoD will initiate a public call for OWASP members interested in committee membership, via the OWASP Community mailing list, with a four-week time window. At this point, the committee will be formed once it receives at least five OWASP member applicants. These OWASP member applicants will be granted committee membership on successful completion of the proposed committee.&lt;br /&gt;
&lt;br /&gt;
A committee should have also a board with at least 5 members, each one having a specific role. Common roles:&lt;br /&gt;
&lt;br /&gt;
·       Organization: Secretary, PR/Marketing, Web, Membership, Finance &amp;amp; Meetings/Conferences, although specific roles can be created at the discretion of the committee&lt;br /&gt;
&lt;br /&gt;
'''IV. Committee Scope'''&lt;br /&gt;
&lt;br /&gt;
The scope of an OWASP committee is established during the initial proposal for the new committee. This scope should be submitted as a draft to the BoD for discussion purposes prior to the committee formation. The Board will assess if this scope is in line with OWASP’s goals and may seek alterations where necessary.&lt;br /&gt;
&lt;br /&gt;
'''Conflict'''&lt;br /&gt;
&lt;br /&gt;
In the event that a community or staff member believes that a committee has taken actions outside of its scope, has abused the committee’s scope, or would like to adjust the scope of a committee, then they may state their rationale and desired response via the OWASP Leaders List. After a community discussion, the community or staff member will request that the OWASP Board of Directors establish the validity of the scope disagreement or proposed scope amendment. A majority vote of the Board is required to modify the scope of any OWASP committee.&lt;br /&gt;
&lt;br /&gt;
If there is a conflict within the committee, the conflict should be brought to the OWASP Compliance Committee who will rule on the conflict based on available evidence and where necessary interviews with the relevant personnel.&lt;br /&gt;
&lt;br /&gt;
Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
'''V. Committee Membership'''&lt;br /&gt;
&lt;br /&gt;
Any OWASP community member is welcome to participate in and provide feedback to an OWASP committee. Committee membership (voting privileges and leadership responsibilities), however, is limited to those who meet the following criteria:&lt;br /&gt;
&lt;br /&gt;
1) Individual must be an OWASP member in good standing; or&lt;br /&gt;
&lt;br /&gt;
2) Individual must have the written endorsement of either a current committee member or an OWASP Board member; or&lt;br /&gt;
&lt;br /&gt;
3) Individual must demonstrate a history of at least three months participation in the committee for which they are applying for membership.&lt;br /&gt;
&lt;br /&gt;
Any person who satisfies the above criteria may, by way of the public committee communication medium outlined in section VIII below, request to be granted membership to the committee. The committee will then conduct a vote on the applicant, via the same medium, and if the majority of members agree, they will be granted committee membership as well.&lt;br /&gt;
&lt;br /&gt;
Active committees are responsible for conducting a poll of members, at least every six months, by the committee staff liaison, asking each if they would like to continue to serve on the committee. Committee members who respond “No” or who do not respond at all during a two-week time window will be removed from membership by the committee.&lt;br /&gt;
&lt;br /&gt;
A member of a committee leadership team may have their membership removed for reasons of inactivity over a period of at least six months or misconduct as determined by a unanimous vote of the remaining members of the committee. If the committee feels that they do not have the required capability to deal with this misconduct, they may submit the case and all relevant documentation to the compliance committee for review.&lt;br /&gt;
&lt;br /&gt;
'''Lack of Participation'''&lt;br /&gt;
&lt;br /&gt;
If at any point in time, for any reason, committee membership is less than five people, then the committee leadership must initiate a public call for OWASP members interested in committee membership with a four-week time window. All qualified applicants must be accepted to join the committee as committee members. If there are not at least five committee members at the end of the four-week time window, the committee will lose its authoritative function, and will function only as in an advisory capacity. All related decision-making will automatically be re-assumed by the OWASP Board of Directors. Committee members are required to report any infractions of OWASP Foundation policies and procedures to the OWASP Board of Directors.&lt;br /&gt;
&lt;br /&gt;
'''VI. OWASP Staff Participation'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation will provide a designated staff member to support each active committee from an operational perspective. The staff member may participate in the committee as a community member, but will not serve as a voting member of the leadership team due to a potential conflict of interest. Participating staff are required to report any infractions of OWASP Foundation policies and procedures, by the committee, to the OWASP Board of Directors. The committee leadership team will be invited to provide feedback for the assessment of their assigned staff member by being invited to provide an annual evaluation of their committee related activities, capability and professionalism.&lt;br /&gt;
&lt;br /&gt;
'''VII. OWASP Board Participation'''&lt;br /&gt;
&lt;br /&gt;
Members of the OWASP Board of Directors are allowed to become committee members, but participate as normal committee members with no special powers either expressed or implied. While Board member participation in committees is encouraged, Board members must refrain from taking an active leadership role for the committee.&lt;br /&gt;
&lt;br /&gt;
'''VIII. Committee Communication'''&lt;br /&gt;
&lt;br /&gt;
All committees are required to hold their discussions in the open in order to enable participation by any member of the community. All committee discussions (written and verbal) must be archived in a publicly accessible location so that the community may observe committee actions at any point in time. Use of the OWASP Force Portal for Committees is strongly encouraged as it provides logical conversation grouping, an archive of conversations, document attachment capability, participation metrics, and more, but other technologies may be used as long as it is agreed upon by all committee members and all relevant information is linked from the respective Committee wiki page. Committees that wish to solicit assistance from outside participants for committee activities are strongly encouraged to do so using the OWASP Initiatives framework.&lt;br /&gt;
&lt;br /&gt;
Committees are required to notify the OWASP Community, via OWASP mailing lists including other mediums such as slack to ensure greater community coverage, in writing of any official votes and provide a written summary of actions taken on a minimum of a monthly basis or as necessary. Committee decisions are considered official once a record has been published to the community. The BoD is responsible for reviewing committee actions and ensuring that the committee is acting within its predefined scope and in accordance with the OWASP Foundation Bylaws as well as all other applicable policies and procedures.&lt;br /&gt;
&lt;br /&gt;
'''IX. Committee Organization'''&lt;br /&gt;
&lt;br /&gt;
All committees are responsible for being self-organized. This includes determining their own leadership structure, coordinating committee meeting schedules at least monthly, taking and publishing minutes of committee meetings, assembling monthly action summaries, culling inactive committee members, and ensuring compliance within the defined scope and various OWASP policies and procedures.&lt;br /&gt;
&lt;br /&gt;
'''X. Committee Removal'''&lt;br /&gt;
&lt;br /&gt;
If at any point in time an OWASP Leader believes that a committee is no longer necessary or that the scope of one committee conflicts with the scope of another, they may bring up this concern via the OWASP Leaders List. After a community discussion, the OWASP BoD will hold a vote on the committee removal. A ⅔ majority vote of the Board is required for the removal of a committee.&lt;br /&gt;
&lt;br /&gt;
'''XI. Empowerment'''&lt;br /&gt;
&lt;br /&gt;
As the goal of this proposal is to empower the community to make decisions for the betterment of the Foundation, no Board vote is necessary for any initiative,  provided that the following is true:&lt;br /&gt;
&lt;br /&gt;
1) The action is within the predetermined scope of the committee;&lt;br /&gt;
&lt;br /&gt;
2) The action does not directly affect other OWASP functions such as projects&lt;br /&gt;
&lt;br /&gt;
3) If money is required, the action follows the guidelines set forth in the Community Engagement Funding document;&lt;br /&gt;
&lt;br /&gt;
4) No contracts are being executed by the committee on behalf of the OWASP Foundation; and&lt;br /&gt;
&lt;br /&gt;
5) The action is in line with the OWASP Foundation Code of Ethics and is pursuant to OWASP’s mission.&lt;br /&gt;
&lt;br /&gt;
If any of these is not true, then the OWASP BoD should be consulted for approval prior to the committee’s execution.&lt;br /&gt;
&lt;br /&gt;
'''XII. Accountability'''&lt;br /&gt;
&lt;br /&gt;
Because the committee is acting on behalf of the OWASP Foundation, but as a separate entity from the OWASP BoD, the committee members are expected to conduct their actions with regard to the OWASP Mission, the OWASP Code of Ethics, and the BoD’s annual strategic goals. The committee and it’s members will ultimately be held accountable for any actions that are not in line with these key principles or that are outside of the predetermined scope of the committee. Alleged violations should be brought to the attention of the OWASP Leaders List along with all substantiating evidence. After a community discussion, the Board may veto the actions of the committee by a majority vote of the BoD.&lt;br /&gt;
&lt;br /&gt;
'''XIII. Conclusion'''&lt;br /&gt;
&lt;br /&gt;
We believe that empowering our volunteers to take action is core to OWASP’s mission. With the above committee structure, we believe that the right pieces will be in place to provide the Foundation with effective governance as well as checks and balances to ensure unbiased operation. We hope that you will agree that executing on this is in the best interests of the future of the OWASP Foundation.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=December_2018&amp;diff=246160</id>
		<title>December 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=December_2018&amp;diff=246160"/>
				<updated>2018-12-19T17:58:12Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: /* Old Business */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Meeting Date: December 19, 2018&lt;br /&gt;
&lt;br /&gt;
Meeting Time: 1:00 PM to 2:30 PM EST ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=12&amp;amp;day=19&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
&lt;br /&gt;
Meeting Location: Virtual&lt;br /&gt;
&lt;br /&gt;
Address: N/A&lt;br /&gt;
&lt;br /&gt;
Virtual:  &amp;lt;nowiki&amp;gt;https://global.gotomeeting.com/join/844511053&amp;lt;/nowiki&amp;gt;  &amp;lt;s&amp;gt;&amp;lt;nowiki&amp;gt;https://www3.gotomeeting.com/join/861328838&amp;lt;/nowiki&amp;gt;&amp;lt;/s&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[International_Toll_Free_Calling_Information |International Toll Free Calling Info]]&lt;br /&gt;
&lt;br /&gt;
 AGENDA&lt;br /&gt;
&lt;br /&gt;
 CALL TO ORDER&lt;br /&gt;
&lt;br /&gt;
 CHANGES TO THE AGENDA&lt;br /&gt;
&lt;br /&gt;
 APPROVAL OF MINUTES&lt;br /&gt;
&lt;br /&gt;
 REPORTS&lt;br /&gt;
&lt;br /&gt;
 OLD BUSINESS&lt;br /&gt;
&lt;br /&gt;
 NEW BUSINESS&lt;br /&gt;
&lt;br /&gt;
 COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS&lt;br /&gt;
&lt;br /&gt;
 ADJOURNMENT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;nowiki&amp;gt;=&amp;lt;/nowiki&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
==Old Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
Committee 2.0 update - https://docs.google.com/document/d/1yw8KQoQ0SVbvP9nRsW52yYGJUuu-qAgi5HlNktBScIo/edit?ts=5bfedf7d&lt;br /&gt;
&lt;br /&gt;
==New Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
Proposed changes to End of Year Projects/Chapter budgets updates:&lt;br /&gt;
* The creation of a general fund for all chapters/projects/committees&lt;br /&gt;
* Request all chapters/projects/committees to state what any additional funds they need&lt;br /&gt;
* The demand is then send to the larger projects/chapters (those with more than $5K in budget) - Request for a budget and any contributions to the general fund&lt;br /&gt;
* Chapters can chose specifically which initiatives they want their funds to go to - OR it goes to the central fund for the foundation to provide financing to other chapters/projects/committees.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=October_2018&amp;diff=244130</id>
		<title>October 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=October_2018&amp;diff=244130"/>
				<updated>2018-10-10T19:37:31Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Meeting Date: October 10th, 2018&lt;br /&gt;
&lt;br /&gt;
Meeting Time: 3:00 to 4:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=10&amp;amp;day=10&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
&lt;br /&gt;
Meeting Location: Physical Meeting at AppSec USA 2018 Conference + Virtual &lt;br /&gt;
&lt;br /&gt;
Address: N/A&lt;br /&gt;
&lt;br /&gt;
Virtual: https://www3.gotomeeting.com/join/861328838&lt;br /&gt;
&lt;br /&gt;
[[International_Toll_Free_Calling_Information |International Toll Free Calling Info]]&lt;br /&gt;
&lt;br /&gt;
 AGENDA&lt;br /&gt;
&lt;br /&gt;
 CALL TO ORDER&lt;br /&gt;
&lt;br /&gt;
 CHANGES TO THE AGENDA&lt;br /&gt;
&lt;br /&gt;
 APPROVAL OF MINUTES&lt;br /&gt;
[https://docs.google.com/document/d/1768gHS7DxUx39yptFFngebOCwCAHQqsAWZWYEOH3Ea0/edit?usp=sharing Prior meeting minutes - September 27]&lt;br /&gt;
 REPORTS&lt;br /&gt;
&lt;br /&gt;
 OLD BUSINESS&lt;br /&gt;
[https://docs.google.com/document/d/1nb_K0vsCFN2Rc5EgxLBLJnvwkpSWLbKQn7lVV6g9cDA/edit?usp=sharing 2018 Strategic Goals]&lt;br /&gt;
 NEW BUSINESS&lt;br /&gt;
&lt;br /&gt;
 COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS&lt;br /&gt;
&lt;br /&gt;
 ADJOURNMENT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;nowiki&amp;gt;=&amp;lt;/nowiki&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
==Old Business==&lt;br /&gt;
2019 Board Eligibility - https://docs.google.com/document/d/1a_adkVd5xL14Gg-Dwoeyg_bTDA3t8y2puy25AYyVQ8s/edit?usp=sharing Greg&lt;br /&gt;
&lt;br /&gt;
Compliance Committee Changes -  https://docs.google.com/document/d/1OSm7Vu5iuE-Uu-iOTjD7XhEXQqwDN_ZJ7jOOYqoiCzo/edit?usp=sharing Greg&lt;br /&gt;
&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
==New Business==&lt;br /&gt;
Vote to change Treasurer position&lt;br /&gt;
&lt;br /&gt;
Vote to amend bylaws on face to face meeting requirements&lt;br /&gt;
&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=October_2018&amp;diff=244129</id>
		<title>October 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=October_2018&amp;diff=244129"/>
				<updated>2018-10-10T18:14:53Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Meeting Date: October 10th, 2018&lt;br /&gt;
&lt;br /&gt;
Meeting Time: 3:00 to 4:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=10&amp;amp;day=10&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
&lt;br /&gt;
Meeting Location: Physical Meeting at AppSec USA 2018 Conference + Virtual &lt;br /&gt;
&lt;br /&gt;
Address: N/A&lt;br /&gt;
&lt;br /&gt;
Virtual: https://www3.gotomeeting.com/join/861328838&lt;br /&gt;
&lt;br /&gt;
[[International_Toll_Free_Calling_Information |International Toll Free Calling Info]]&lt;br /&gt;
&lt;br /&gt;
 AGENDA&lt;br /&gt;
&lt;br /&gt;
 CALL TO ORDER&lt;br /&gt;
&lt;br /&gt;
 CHANGES TO THE AGENDA&lt;br /&gt;
&lt;br /&gt;
 APPROVAL OF MINUTES&lt;br /&gt;
[https://docs.google.com/document/d/1768gHS7DxUx39yptFFngebOCwCAHQqsAWZWYEOH3Ea0/edit?usp=sharing Prior meeting minutes - September 27]&lt;br /&gt;
 REPORTS&lt;br /&gt;
&lt;br /&gt;
 OLD BUSINESS&lt;br /&gt;
[https://docs.google.com/document/d/1nb_K0vsCFN2Rc5EgxLBLJnvwkpSWLbKQn7lVV6g9cDA/edit?usp=sharing 2018 Strategic Goals]&lt;br /&gt;
 NEW BUSINESS&lt;br /&gt;
&lt;br /&gt;
 COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS&lt;br /&gt;
&lt;br /&gt;
 ADJOURNMENT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;nowiki&amp;gt;=&amp;lt;/nowiki&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
==Old Business==&lt;br /&gt;
2019 Board Eligibility - https://docs.google.com/document/d/1a_adkVd5xL14Gg-Dwoeyg_bTDA3t8y2puy25AYyVQ8s/edit?usp=sharing Greg&lt;br /&gt;
&lt;br /&gt;
Compliance Committee Changes -  https://docs.google.com/document/d/1OSm7Vu5iuE-Uu-iOTjD7XhEXQqwDN_ZJ7jOOYqoiCzo/edit?usp=sharing Greg&lt;br /&gt;
&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
==New Business==&lt;br /&gt;
Vote to change Treasurer position&lt;br /&gt;
&lt;br /&gt;
Vote to amend bylaws on face to face requirements&lt;br /&gt;
&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=October_2018&amp;diff=244128</id>
		<title>October 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=October_2018&amp;diff=244128"/>
				<updated>2018-10-10T17:40:45Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: /* New Business */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Meeting Date: October 10th, 2018&lt;br /&gt;
&lt;br /&gt;
Meeting Time: 3:00 to 4:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=10&amp;amp;day=10&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
&lt;br /&gt;
Meeting Location: Physical Meeting at AppSec USA 2018 Conference + Virtual &lt;br /&gt;
&lt;br /&gt;
Address: N/A&lt;br /&gt;
&lt;br /&gt;
Virtual: https://www3.gotomeeting.com/join/861328838&lt;br /&gt;
&lt;br /&gt;
[[International_Toll_Free_Calling_Information |International Toll Free Calling Info]]&lt;br /&gt;
&lt;br /&gt;
 AGENDA&lt;br /&gt;
&lt;br /&gt;
 CALL TO ORDER&lt;br /&gt;
&lt;br /&gt;
 CHANGES TO THE AGENDA&lt;br /&gt;
&lt;br /&gt;
 APPROVAL OF MINUTES&lt;br /&gt;
[https://docs.google.com/document/d/1768gHS7DxUx39yptFFngebOCwCAHQqsAWZWYEOH3Ea0/edit?usp=sharing Prior meeting minutes - September 27]&lt;br /&gt;
 REPORTS&lt;br /&gt;
&lt;br /&gt;
 OLD BUSINESS&lt;br /&gt;
[https://docs.google.com/document/d/1nb_K0vsCFN2Rc5EgxLBLJnvwkpSWLbKQn7lVV6g9cDA/edit?usp=sharing 2018 Strategic Goals]&lt;br /&gt;
 NEW BUSINESS&lt;br /&gt;
&lt;br /&gt;
 COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS&lt;br /&gt;
&lt;br /&gt;
 ADJOURNMENT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;nowiki&amp;gt;=&amp;lt;/nowiki&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
==Old Business==&lt;br /&gt;
2019 Board Eligibility - https://docs.google.com/document/d/1a_adkVd5xL14Gg-Dwoeyg_bTDA3t8y2puy25AYyVQ8s/edit?usp=sharing Greg&lt;br /&gt;
&lt;br /&gt;
Compliance Committee Changes -  https://docs.google.com/document/d/1OSm7Vu5iuE-Uu-iOTjD7XhEXQqwDN_ZJ7jOOYqoiCzo/edit?usp=sharing Greg&lt;br /&gt;
&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
==New Business==&lt;br /&gt;
Vote to change Treasurer position&lt;br /&gt;
&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Board&amp;diff=236723</id>
		<title>Board</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Board&amp;diff=236723"/>
				<updated>2018-01-09T18:20:58Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: Updating the link to my profile&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= Board Meetings =&lt;br /&gt;
[https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Bylaws] are the most important legal document of any organization. Bylaws outline in writing the day-to-day rules for your organization and provide comprehensive guidelines to keep things running smoothly. If you want to understand the business of OWASP Foundation the best way to do that would be to examine the bylaws the the [https://www.owasp.org/index.php/About_OWASP#Form_990_Documents 990 forms filed with the United States Government as a non-profit annually.]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Global Bylaws]&lt;br /&gt;
&lt;br /&gt;
== Upcoming 2018 Meetings ==   '''PENDING'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All board meeting notes that include actions as a result will be tracked in a single document for all meetings [https://docs.google.com/a/owasp.org/document/d/1aPmftVZH3-G96J6-wrpynwwZhBHtREe5a7g8owVYUag/edit?usp=sharing click here]&lt;br /&gt;
&lt;br /&gt;
==2018 Elected by Membership, Global Board Members - '''BOARD POSITIONS TO FOLLOW''' == &lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Member, Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History Historical Board Members by Year]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:Knoblochmartin | Martin Knobloch]]:  ====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====[[User:Matt_Konda | Matt Konda]]====&lt;br /&gt;
­&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:vanderaj |Andrew van der Stock]]: ====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[Chenxi_Wang,_Ph.D._(Forrester_Research) | Chenxi Wang, Ph.D.]]:  ====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== [https://www.owasp.org/index.php?title=User:Owen_Pendlebury Owen Pendlebury]:====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====[[Sherif Mansour ]]:  ====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Greg Anderson:  ====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= How Meetings Operate =&lt;br /&gt;
'''CALL TO ORDER'''&lt;br /&gt;
&lt;br /&gt;
The first order of business is for the chair to announce the call to order, along with the time. The secretary enters the time of the call to order in the minutes. After the meeting is called to order, the board chair may make welcoming remarks, ask for introductions, or read the organization’s mission and vision statements.&lt;br /&gt;
&lt;br /&gt;
'''CHANGES TO THE AGENDA'''&lt;br /&gt;
&lt;br /&gt;
The second order of business is for the chair to ask for changes to the agenda. Additions and deletions to the agenda will be made at this time. Having no changes, the agenda moves to approving the prior meeting’s minutes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''APPROVAL OF MINUTES'''&lt;br /&gt;
&lt;br /&gt;
The third item on the agenda should list “Approval of Minutes” along with the date of the most recent meeting. In most cases, board members should have received a copy of the minutes prior to the meeting. If they have not contacted the secretary prior to the meeting with corrections or changes to the minutes, they have to opportunity to make them during this item on the agenda.&lt;br /&gt;
&lt;br /&gt;
Board members have an ethical and legal responsibility to make sure that the recording of the minutes accurately reflect the board’s business.&lt;br /&gt;
&lt;br /&gt;
'''REPORTS'''&lt;br /&gt;
&lt;br /&gt;
The fourth item on the agenda is the reports. This first report should be a report from the Executive Director. This report should include a review of operations and projects. The Executive Director should give board members on overview of the business outlook including positive and negative trends, major initiatives, business updates, and other aspects of the business.&lt;br /&gt;
&lt;br /&gt;
Following the Executive Director report, the Finance Director gives a report. Board members should make an effort to understand the financial reports so that they can identify potential financial threats. Understanding financial reports may also generate discussion about potential opportunities.&lt;br /&gt;
&lt;br /&gt;
Subsequent reports may be given by committee chairs.&lt;br /&gt;
&lt;br /&gt;
'''OLD BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Items should include past business items that are unresolved, need further discussion, or require a board vote. Items may be tabled or referred to committee for further exploration.&lt;br /&gt;
&lt;br /&gt;
'''NEW BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Board members should have a discussion about new business items and identify a plan to take action. This may include tabling them, delaying action to a future date, or referring them to a committee.&lt;br /&gt;
&lt;br /&gt;
'''COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
At this point in the agenda, members may make announcements, such as offering congratulations or condolences, or make other special announcements. Any other business may be brought up at this time, for example, items that may need to be added to the next meeting’s agenda.&lt;br /&gt;
&lt;br /&gt;
'''ADJOURNMENT'''&lt;br /&gt;
&lt;br /&gt;
This is a formal closing of the meeting by the board chair. He should state the time that the meeting closed, so that the secretary may including it in the board minutes. The date of the next meeting should follow the adjournment item, so that board members will be reminded to put it on their calendars.&lt;br /&gt;
&lt;br /&gt;
For more information about the Roberts Rules of Order see this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
= Voting History =&lt;br /&gt;
&lt;br /&gt;
=== Historical Votes on Motions ===&lt;br /&gt;
The purpose of this is to track the position on each motion as presented and how the elected official voted on the motion. This is useful for the membership to review how elected officials voted on items that effect the organization and its [https://www.owasp.org/index.php/OWASP_Foundation_ByLaws bylaws]. A motion is a request for action (budget requests, policy changes, new partnerships etc.) they can be presented by ANYONE to the board such as a member of the public, a member of the OWASP Foundation but does require a sponsor on the Board.  That sponsor will present the motion to the board at least (10) working days in advance so it can be read in advance of the meeting.  If appropriate a motion can be presented based to take action on the motion as written. For a vote to be called and action to be taken a second board member is required to carry the business to vote. On completion of the discussion the chairman will call for a vote to the motion YES, NO, ABSTAIN. For more details on this process try this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/OWASP_Board_Votes Historical Board Votes]&lt;br /&gt;
&lt;br /&gt;
Note that if a motion is presented and is voted on and it is approved action will be taken to implement the motion.  If the motion fails it can be resubmitted and the process starts again as if it is a new motion.&lt;br /&gt;
&lt;br /&gt;
=== Attendance Tracker===&lt;br /&gt;
This is used to keep track that Board Members meet 75% attendance requirements as noted in section 3.03 of the organization bylaws. A meeting is logged as attended if the board member attends the entire meeting as scheduled from the call to order until it is adjourned, this includes executive session if applicable that is closed to the membership and general public for reasons related to human resources and legal issues that require it by law or for the good of the OWASP Foundation Inc. - &lt;br /&gt;
 [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracker]&lt;br /&gt;
&lt;br /&gt;
= Historical Meeting Archive =&lt;br /&gt;
&lt;br /&gt;
== Archive 2017 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[December 6, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=12&amp;amp;day=06&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2017]], 07:00-08:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=11&amp;amp;day=8&amp;amp;hour=15&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[October 11, 2017]],  15:00 - 17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 19, 2017]] 15:00-17:30 PDT, in Orlando at AppSecUSA - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=9&amp;amp;day=19&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 6, 2017]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=09&amp;amp;day=06&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] (Cancelled for interviews)&lt;br /&gt;
*[[August 9, 2017]], 16:00-17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=08&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[July 5, 2017]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=07&amp;amp;day=05&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[June 7, 2017]], 18:00-21:00 CEST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=06&amp;amp;day=07&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[May 9, 2017]],  18:00-19:30 IST, in Belfast at AppSecEU - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=5&amp;amp;day=9&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[April 12, 2017]], 16:00-17:00 PDT - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=04&amp;amp;day=12&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]  ('''Cancelled''' [http://lists.owasp.org/pipermail/owasp-board/2017-April/017969.html Notice by Matt Konda])&lt;br /&gt;
*[[March 22, 2017]] 06:00-07:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=3&amp;amp;day=22&amp;amp;hour=13&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] - *Special Meeting to approve the 2017 Budget*&lt;br /&gt;
* [[March 8, 2017]], 06:00-07:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=03&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 8, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=02&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 11, 2017]], 14:00-15:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=1&amp;amp;day=10&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2016 Meetings ==&lt;br /&gt;
* [[December 14, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=12&amp;amp;day=14&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* CANCELLED - [[November 30, 2016]], 15:00-16:30 PST - placeholder only optional if needed - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=30&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[October 11, 2016]], at AppSecUSA 18:00 - 21:00 EDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[September 21, 2016]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=09&amp;amp;day=21&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[August 23, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=08&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 1, 2016]], 18:00-21:00 CEST, in Rome at AppSecEU - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=01&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 27, 2016]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=27&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[May 18, 2016]],  07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=05&amp;amp;day=18&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[April 20, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=04&amp;amp;day=20&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[March 16, 2016]], 16:00-17:00 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=03&amp;amp;day=16&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 17, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=02&amp;amp;day=17&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 13, 2016]], 16:00-17:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=01&amp;amp;day=14&amp;amp;hour=00&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2015 Meetings ==&lt;br /&gt;
* [[December 9, 2015]], 15:00-17:00 PST &lt;br /&gt;
* [[November 18, 2015]], 14:00-15:30 PST&lt;br /&gt;
* [[November 4, 2015]], 12:00-13:30 PST&lt;br /&gt;
* [[October 14, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[September 25, 2015]] at AppSecUSA 18:00 - 20:00 PST&lt;br /&gt;
* [[August 12, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[July 22, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[June 24, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[May 22, 2015]],  18:00-20:00 CEST in Amsterdam @ AppSec-EU , 9:00am-11:00am PST;&lt;br /&gt;
* [[April 29, 2015]], 12:00-13:00 PST&lt;br /&gt;
* [[March 25, 2015]], 12:00-13:00 PST &lt;br /&gt;
* [[February 11, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[January 14, 2015]], 9am-10am PST&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive for 2014 Meetings ==&lt;br /&gt;
* [[December 10, 2014]], 9am-10am PST&lt;br /&gt;
* [[November 12, 2014]], 9am - 10am PST&lt;br /&gt;
* [[October 8, 2014]], 9am-10am PST&lt;br /&gt;
* [[September 16, 2014]], 6pm - 9pm MST, In person at Appsec USA &lt;br /&gt;
* [[August 13, 2014]], 9am-10am PST&lt;br /&gt;
* [[July 9, 2014]], 9am-10am PST&lt;br /&gt;
* [[June 27, 2014]], 8am - 4 pm BST, In person at AppSec Europe&lt;br /&gt;
* [[April 30, 2014]],9am - 12pm PST&lt;br /&gt;
* [[March 3, 2014]], 7am - 10am PST&lt;br /&gt;
* [[February 24, 2014]], 8am - 10am PST&lt;br /&gt;
&lt;br /&gt;
== Archive for 2013 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[December 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
* December 2, 2013 - Special Board Meeting - [https://docs.google.com/spreadsheet/ccc?key=0ApZ9zE0hx0LNdGdJZ1BIaEZkc2V1QV81NmJ4dnI0R1E&amp;amp;usp=sharing 2014 Budget] walk through, Q &amp;amp; A (no meeting notes)&lt;br /&gt;
&lt;br /&gt;
*[[November 22, 2013]] - In person meeting at AppSec USA - New York, NY&lt;br /&gt;
&lt;br /&gt;
* November 11, 2013 - cancelled due to in person meeting on Nov. 22&lt;br /&gt;
&lt;br /&gt;
*[[October 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[September 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[In person meeting at AppSec EU - Hamburg, Germany; August 19-24]]&lt;br /&gt;
&lt;br /&gt;
* August 12, 2013 - canceled due to in person meeting on Aug 19&lt;br /&gt;
&lt;br /&gt;
*[[July 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[June 10, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 31, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 13, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[April 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[March 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[February 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[January 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2012 Meetings ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation [https://www.owasp.org/images/a/ae/2012ByLawsFINAL.pdf ByLaws]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Global_Committee_Pages Global Committees] &lt;br /&gt;
&lt;br /&gt;
*[[January 9, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 6, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 15, 2012]] &lt;br /&gt;
&lt;br /&gt;
*[[March 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[April 5, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[May 14,2012]]&lt;br /&gt;
&lt;br /&gt;
*[[June 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Aug 13, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Sept 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 8, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 24, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 26, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
*[[Dec 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Dec 27, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
== Archive for 2011 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[March 7, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[April_4_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[May_2_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[June 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[August 8, 2011]] &lt;br /&gt;
&lt;br /&gt;
*[[September 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 20, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 22, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[October 10, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[November 14, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[December 5, 2011]]&lt;br /&gt;
&lt;br /&gt;
== Minutes for 2011 Meetings ==  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Votes Historical]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[Minutes January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes March 8, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 4, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 2, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VD9ZHEwht9tmM8FKEQ6DBrtmL_gTAhSSnQhiFXYkJ7I/edit?hl=en_US&amp;amp;authkey=CIavkP4B June 6 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VMwYrP6owtZ-SchBxUcWTIF-ITvzUX8PjUkLPwr2ipg/edit?hl=en_US&amp;amp;authkey=CIGTx5sD July 11 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1CLu9aQpS7LdeX87rJ5N9cuJ-RGGVzDWf34l6gdMml7M/edit?hl=en_US&amp;amp;authkey=CI-U5qEP August 8, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1HM32VcvWb0hizD5_mhWMULLaouzuRgA3ZYjODRZwyAs/edit?hl=en_US September 6, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1Y-8tZisUZM5ZKP8AxJqvkiNtFanVFM0m--bMG2PZ3ww/edit October 10, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/13-aHX2pSUXjCP8ivsbls6u1VX1BVSYewyMUH8LI7zpQ/edit November 14, 2011]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2010 Meetings ==&lt;br /&gt;
*[[January 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[February 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]] &amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;Postponed until March 9, 2010&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[[April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[May 4, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[August 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[September 8, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[December_6_2010]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2010 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[Jan 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Feb 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes_December_6,_2010]]&lt;br /&gt;
&lt;br /&gt;
*[[OWASP Board Meetings January Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings February Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June 09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting July 7, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting August 4, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting September 1, 2009 Agenda]] &lt;br /&gt;
*[[OWASP Board Meeting October 6, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting November 10, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting December 1, 2009 Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2009 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 01-06-09]]&lt;br /&gt;
* [[OWASP Board Meetings 02-03-09]]&lt;br /&gt;
* [[OWASP Board Meetings 03-10-09]]&lt;br /&gt;
* [[OWASP Board Meetings April 09]]&lt;br /&gt;
* [[OWASP Board Meetings May 09]]&lt;br /&gt;
* [[OWASP Board Meetings June 09]]&lt;br /&gt;
* [[OWASP Board Meeting July 09]]&lt;br /&gt;
* [[OWASP Board Meeting August 09]]&lt;br /&gt;
* [[OWASP Board Meeting September 09]]&lt;br /&gt;
* [[OWASP Board Meeting October 09]]&lt;br /&gt;
* [[OWASP Board Meeting December 09]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2008 Meetings ==&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings July Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings August Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings September Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings October Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings December Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2008 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 2-7-08]]&lt;br /&gt;
* [[OWASP Board Meetings 3-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 5-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 6-3-08]]&lt;br /&gt;
* [[OWASP Board Meetings 8-14-08]]&lt;br /&gt;
* [[OWASP Board Meetings 9-2-08]] &lt;br /&gt;
* [[Owasp Board Meetings 10-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 11-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 12-02-08]]&lt;br /&gt;
&lt;br /&gt;
= Board Election Archive =&lt;br /&gt;
&lt;br /&gt;
All elected officers are required to [https://docs.google.com/document/d/10zBT6oY2Q3B6kr6r7DGl3Cc0f5rGmQ0Slc6RYvbxmus/edit review sign and return] the following document before starting their term in office to the then current board Secretary &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History OWASP Board History]&lt;br /&gt;
&lt;br /&gt;
===2017 Election===&lt;br /&gt;
[https://www.owasp.org/index.php/2017_Global_Board_of_Directors_Election 2017 Board Election]&lt;br /&gt;
=== 2016 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2016_Global_Board_of_Directors_Election 2016 Board Election]&lt;br /&gt;
=== 2015 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2015_Global_Board_of_Directors_Election 2015 Board Election]&lt;br /&gt;
=== 2014 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2014_Board_Elections 2014 Board Election]&lt;br /&gt;
=== 2013 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2013_Board_Elections 2013 Board Election]&lt;br /&gt;
=== 2012 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2012_Election 2012 Board Election]&lt;br /&gt;
=== 2011 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2011Election 2011 Board Election]&lt;br /&gt;
=== 2009 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Board_Election_2009 2009 Board Election]&lt;br /&gt;
&lt;br /&gt;
=== Past OWASP Boards ===&lt;br /&gt;
&lt;br /&gt;
[[Board-2018]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2017]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2016]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2015]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2014]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2013]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2012]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2011]]&lt;br /&gt;
&lt;br /&gt;
= Misc. =&lt;br /&gt;
&lt;br /&gt;
* Teleconference Information: **CHECK MEETING INFORMATION**&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/International_Toll_Free_Calling_Information International Toll Free Calling Info]&lt;br /&gt;
&lt;br /&gt;
* Meeting Template found [https://www.owasp.org/index.php/Board-Meeting-template here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Owen_Pendlebury_2017_Bio_%26_Why_Me%3F&amp;diff=232112</id>
		<title>Owen Pendlebury 2017 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Owen_Pendlebury_2017_Bio_%26_Why_Me%3F&amp;diff=232112"/>
				<updated>2017-08-09T10:38:18Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: updated a small bit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Owen Pendlebury&lt;br /&gt;
&lt;br /&gt;
'''About Owen:'''&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 7 years. Furthermore, Owen has been heavily involved in the OWASP Women in AppSec committee mentoring within the community. Some of the projects that Owen has been involved in include, AppSec EU 2016 Committee/ Training Committee, AppSec EU 2017 co-organisor/ training chair, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars and numerous security workshops. In 2016 Owen received a WASPY award for his contributions to OWASP and the community.&lt;br /&gt;
&lt;br /&gt;
Owen has over 7 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently penetration testing lead for Deloitte Ireland.&lt;br /&gt;
&lt;br /&gt;
Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
&lt;br /&gt;
'''Why Me?'''&lt;br /&gt;
I am extremely passionate about OWASP and the community. My main goal is to improve Europe’s/ global security capabilities and I feel I achieve this with a real can-do attitude. I would use my position on the board to ensure that Europe has an equal say and are aligned with OWASPs strategic goals. I would relish the opportunity to get involved at a global level.&lt;br /&gt;
&lt;br /&gt;
The main areas in which I feel I can aid in improving within OWASP globally are;&lt;br /&gt;
&lt;br /&gt;
Projects – focus on projects new, immature and mature aiding these projects to progress to flagship OWASP projects. I feel that there are a number of key projects that have been left in incubator status for way too long. We need work with these projects in order for OWASP to grow. Existing projects need to be encouraged to grow.&lt;br /&gt;
&lt;br /&gt;
Governance – Enable chapters and new OWASP members to flourish without the shadow of big names. OWASP is about the community and we need to focus on the community. Chapters need to be empowered to grow. We need to be transparent in all our actions.&lt;br /&gt;
&lt;br /&gt;
Education – I feel that OWASP can reach further in the community. Not only to security professionals but to students. Students both in college and at high school levels should be empowered to join OWASP and learn from our community. We should stimulate enough interest at Community level to cause student volunteers to engage &amp;amp; participate.&lt;br /&gt;
&lt;br /&gt;
Build relationships with industry, government, and educational institutions&lt;br /&gt;
&lt;br /&gt;
Support the overall OWASP community and its various activities&lt;br /&gt;
&lt;br /&gt;
Increasing the awareness of OWASP outside the security community&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=231856</id>
		<title>OWASP Internet of Things Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internet_of_Things_Project&amp;diff=231856"/>
				<updated>2017-07-26T10:00:52Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: /* Related Projects */  fixing typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Internet of Things (IoT) Project==&lt;br /&gt;
&lt;br /&gt;
Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”&lt;br /&gt;
&lt;br /&gt;
''The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies''. &lt;br /&gt;
&lt;br /&gt;
The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[File:iot-project.png|400px|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Internet of Things Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Internet of Things Project? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Internet of Things Project provides information on:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Attack_Surface_Areas IoT Attack Surface Areas]&lt;br /&gt;
* IoT Vulnerabilities&lt;br /&gt;
* Firmware Analysis&lt;br /&gt;
* ICS/SCADA Software Weaknesses&lt;br /&gt;
* Community Information&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Testing_Guides IoT Testing Guides]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Security_Guidance IoT Security Guidance]&lt;br /&gt;
* [https://www.owasp.org/index.php/Principles_of_IoT_Security Principles of IoT Security]&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Framework_Assessment IoT Framework Assessment]&lt;br /&gt;
* Developer, Consumer and Manufacturer Guidance&lt;br /&gt;
* Design Principles&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Justin_C._Klein_Keane Justin Klein Keane]&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Project|OWASP Project Repository]]&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
* [[OWASP_.NET_Project|OWASP .NET]]&lt;br /&gt;
* [[Java|OWASP Java and JVM]]&lt;br /&gt;
* [[C/C++|OWASP C/C++]]&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
Hint: If you're new to Slack, [https://lists.owasp.org/pipermail/owasp-community/2015-July/000703.html join OWASP's slack channel first], then join #iot-security within OWASP's channel.&lt;br /&gt;
&amp;lt;!-- Hey Guys - Andy Lewis here.  I'm not great w/slack but when I browse to https://owasp-iot-security.slack.com/signup&lt;br /&gt;
I'm getting &amp;quot;This team's administrator has not enabled email signups.&amp;quot; and &amp;quot;Ask your administrator to send you an invitation.&amp;quot;&lt;br /&gt;
I'm adding this comment in hopes of being able to get in contact w/someone from the project after Blackhat/Defcon.&lt;br /&gt;
If you're reading this, could you please reach out to me &lt;br /&gt;
alewis@owasp.org&lt;br /&gt;
or open up the slack channel to auto-OK @owasp.org addresses?&lt;br /&gt;
Thanks&lt;br /&gt;
Andy&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping DEFCON 23]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/2d/Iot_testing_methodology.JPG IoT Testing Guidance Handout]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014-OWASP.pdf OWASP IoT Top Ten PDF]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/8/8e/Infographic-v1.jpg OWASP IoT Top Ten Infographic]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/01/Internet_of_Things_Top_Ten_2014-OWASP-ppt.pptx OWASP IoT Top Ten PPT]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf OWASP IoT Top Ten-RSA 2015]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/b/bd/OWASP-IoT.pptx OWASP IoT Project Overview]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Added a [https://owasp-iot-security.slack.com/ Slack channel]&lt;br /&gt;
* Added a sub-project; [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Security_Policy_Project IoT Security Policy Project]&lt;br /&gt;
* Daniel Miessler gave his [https://www.youtube.com/watch?v=RhxHHD790nw IoT talk at DEFCON 23]&lt;br /&gt;
* Migrating the IoT Top Ten to be under the IoT Project&lt;br /&gt;
* HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Attack Surface Areas =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Attack Surface Areas Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
** UART (Serial)&lt;br /&gt;
** JTAG / SWD&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure ([[Top 10 2013-A6-Sensitive Data Exposure|See OWASP Top 10 - A6 Sensitive data exposure]]):&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
** Verify for old sw versions and possible attacks (Heartbleed, Shellshock, old PHP versions etc)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade possibility&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Firmware loaded over insecure channel (no TLS)&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Check for insecure direct object references&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
* Standard set of web application vulnerabilities, see:&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Web Top 10]]&lt;br /&gt;
** [[:Category:OWASP Application Security Verification Standard Project|OWASP ASVS]]&lt;br /&gt;
** [[:Category:OWASP Testing Project|OWASP Testing guide]]&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Privacy'''&lt;br /&gt;
|&lt;br /&gt;
* User data disclosure&lt;br /&gt;
* User/device location disclosure&lt;br /&gt;
* Differential privacy&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damage (Physicall)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Attack Surface Areas Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Attack Surface Areas Project provides a list of attack surfaces that should be understood by manufacturers, developers, security researchers, and those looking to deploy or implement IoT technologies within their organizations.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Vulnerabilities =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Vulnerabilities Project ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Vulnerability&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Summary&lt;br /&gt;
|-&lt;br /&gt;
| '''Username Enumeration'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to collect a set of valid usernames by interacting with the authentication mechanism&lt;br /&gt;
|-&lt;br /&gt;
| '''Weak Passwords'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to set account passwords to '1234' or '123456' for example.&lt;br /&gt;
* Usage of pre-programmed default passwords&lt;br /&gt;
|-&lt;br /&gt;
| '''Account Lockout'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Device Web Interface&lt;br /&gt;
* Cloud Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Ability to continue sending authentication attempts after 3 - 5 failed login attempts&lt;br /&gt;
|-&lt;br /&gt;
| '''Unencrypted Services'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Network services are not properly encrypted to prevent eavesdropping or tampering  by attackers&lt;br /&gt;
|-&lt;br /&gt;
| '''Two-factor Authentication'''&lt;br /&gt;
|&lt;br /&gt;
* Administrative Interface&lt;br /&gt;
* Cloud Web Interface&lt;br /&gt;
* Mobile Application&lt;br /&gt;
|&lt;br /&gt;
* Lack of two-factor authentication mechanisms such as a security token or fingerprint scanner&lt;br /&gt;
|-&lt;br /&gt;
| '''Poorly Implemented Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Encryption is implemented however it is improperly configured or is not being properly updated, e.g. using SSL v2 &lt;br /&gt;
|-&lt;br /&gt;
| '''Update Sent Without Encryption'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Updates are transmitted over the network without using TLS or encrypting the update file itself&lt;br /&gt;
|-&lt;br /&gt;
| '''Update Location Writable'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* Storage location for update files is world writable potentially allowing firmware to be modified and distributed to all users&lt;br /&gt;
|-&lt;br /&gt;
| '''Denial of Service'''&lt;br /&gt;
|&lt;br /&gt;
* Device Network Services&lt;br /&gt;
|&lt;br /&gt;
* Service can be attacked in a way that denies service to that service or the entire device&lt;br /&gt;
|-&lt;br /&gt;
| '''Removal of Storage Media'''&lt;br /&gt;
|&lt;br /&gt;
* Device Physical Interfaces&lt;br /&gt;
|&lt;br /&gt;
* Ability to physically remove the storage media from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''No Manual Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to manually force an update check for the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Missing Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update Mechanism&lt;br /&gt;
|&lt;br /&gt;
* No ability to update device&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware Version Display and/or Last Update Date'''&lt;br /&gt;
|&lt;br /&gt;
* Device Firmware&lt;br /&gt;
|&lt;br /&gt;
* Current firmware version is not displayed and/or the last update date is not displayed&lt;br /&gt;
|-&lt;br /&gt;
| '''Firmware and storage extraction'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://www.flashrom.org/Flashrom In-Situ dumping]&lt;br /&gt;
* Intercepting a OTA update&lt;br /&gt;
* Downloading from the manufacturers web page&lt;br /&gt;
* [https://www.exploitee.rs/index.php/Exploitee.rs_Low_Voltage_e-MMC_Adapter eMMC tapping]&lt;br /&gt;
* Unsoldering the SPI Flash / eMMC chip and reading it in a adapter&lt;br /&gt;
|&lt;br /&gt;
* Firmware contains a lot of useful information, like source code and binaries of running services, pre-set passwords, ssh keys etc.  &lt;br /&gt;
|-&lt;br /&gt;
| '''Manipulating the code execution flow of the device'''&lt;br /&gt;
|&lt;br /&gt;
* JTAG / SWD interface&lt;br /&gt;
* [https://wiki.newae.com/Main_Page Side channel attacks like glitching]&lt;br /&gt;
|&lt;br /&gt;
* With the help of a JTAG adapter and gdb we can modify the execution of firmware in the device and bypass almost all software based security controls.&lt;br /&gt;
* Side channel attacks can also modify the execution flow or can be used to leak interesting information from the device&lt;br /&gt;
|-&lt;br /&gt;
| '''Obtaining console access'''&lt;br /&gt;
|&lt;br /&gt;
* Serial interfaces (SPI / UART)&lt;br /&gt;
|&lt;br /&gt;
* By connecting to a serial interface, we will obtain full console access to a device&lt;br /&gt;
* Usually security measures include custom bootloaders that prevent the attacker from entering single user mode, but that can also be bypassed.&lt;br /&gt;
|-&lt;br /&gt;
| '''Insecure 3rd party components'''&lt;br /&gt;
|&lt;br /&gt;
* Software&lt;br /&gt;
|&lt;br /&gt;
* Out of date versions of busybox, openssl, ssh, web servers, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Vulnerabilities Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Vulnerabilities Project provides:&lt;br /&gt;
&lt;br /&gt;
* Information on the top IoT vulnerabilities&lt;br /&gt;
* The attack surface associated with the vulnerability&lt;br /&gt;
* A summary of the vulnerability&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_IoT_Vulnerabilities Top 10 IoT Vulnerabilities from 2014]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Medical Devices =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Medical Device Testing ==&lt;br /&gt;
&lt;br /&gt;
The Medical Device Testing project is intended to provide some basic attack surface considerations that should be evaluated before shipping Medical Device equipment.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem (general)'''&lt;br /&gt;
|&lt;br /&gt;
* Interoperability standards&lt;br /&gt;
* Data governance&lt;br /&gt;
* System wide failure&lt;br /&gt;
* Individual stakeholder risks&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''HL7'''&lt;br /&gt;
|&lt;br /&gt;
* XML Parsing&lt;br /&gt;
** XSS&lt;br /&gt;
* Information Disclosure&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data&lt;br /&gt;
** Cleartext usernames&lt;br /&gt;
** Cleartext passwords&lt;br /&gt;
** Third-party credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
* Tamper resistance&lt;br /&gt;
* Debug port&lt;br /&gt;
* Device ID/Serial number exposure&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Sensitive data exposure:&lt;br /&gt;
** Backdoor accounts&lt;br /&gt;
** Hardcoded credentials&lt;br /&gt;
** Encryption keys&lt;br /&gt;
** Encryption (Symmetric, Asymmetric)&lt;br /&gt;
** Sensitive information&lt;br /&gt;
** Sensitive URL disclosure&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
* Security related function API exposure&lt;br /&gt;
* Firmware downgrade&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
* Device Firmware OTA update block&lt;br /&gt;
* Replay attack&lt;br /&gt;
* Lack of payload verification&lt;br /&gt;
* Lack of message integrity check&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
** Username enumeration&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
* Use of static same enc/dec key&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* Standard set of web vulnerabilities:&lt;br /&gt;
** SQL injection&lt;br /&gt;
** Cross-site scripting&lt;br /&gt;
** Cross-site Request Forgery&lt;br /&gt;
* Credential management vulnerabilities:&lt;br /&gt;
** Username enumeration&lt;br /&gt;
** Weak passwords&lt;br /&gt;
** Account lockout&lt;br /&gt;
** Known default credentials&lt;br /&gt;
** Insecure password recovery mechanism&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Update authentication&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
* Hidden services&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
* Wireless (WiFi, Z-wave, XBee, Zigbee, Bluetooth, LoRA)&lt;br /&gt;
* Protocol fuzzing&lt;br /&gt;
|- &lt;br /&gt;
| '''Authentication/Authorization'''&lt;br /&gt;
|&lt;br /&gt;
* Authentication/Authorization related values (session key, token, cookie, etc.) disclosure&lt;br /&gt;
* Reusing of session key, token, etc.&lt;br /&gt;
* Device to device authentication&lt;br /&gt;
* Device to mobile Application authentication&lt;br /&gt;
* Device to cloud system authentication&lt;br /&gt;
* Mobile application to cloud system authentication&lt;br /&gt;
* Web application to cloud system authentication&lt;br /&gt;
* Lack of dynamic authentication&lt;br /&gt;
|-&lt;br /&gt;
| '''Data Flow'''&lt;br /&gt;
|&lt;br /&gt;
* What data is being captured?&lt;br /&gt;
* How does it move within the ecosystem?&lt;br /&gt;
* How is it protected in transit?&lt;br /&gt;
* How is it protected at rest?&lt;br /&gt;
* Who is that data shared with?&lt;br /&gt;
|-&lt;br /&gt;
| '''Hardware (Sensors)'''&lt;br /&gt;
|&lt;br /&gt;
* Sensing Environment Manipulation&lt;br /&gt;
* Tampering (Physically)&lt;br /&gt;
* Damaging (Physically)&lt;br /&gt;
* Failure state analysis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Medical Attack Surfaces project? ==&lt;br /&gt;
&lt;br /&gt;
The Medical Attack Surfaces project provides:&lt;br /&gt;
&lt;br /&gt;
* A simple way for testers, manufacturers, developers, and users to get an understanding of the complexity of a modern medical environment&lt;br /&gt;
* Allows people to visualize the numerous attack surfaces that need to be defended within medical equipment ecosystems&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Daniel Miessler presented on using Adaptive Testing Methodologies to evaluate the security of medical devices at RSA 2017.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Firmware Analysis =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Firmware Analysis Project ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project is intended to provide security testing guidance for the IoT Attack Surface &amp;quot;Device Firmware&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Section&lt;br /&gt;
! &lt;br /&gt;
|- &lt;br /&gt;
|&lt;br /&gt;
Device Firmware Vulnerabilities&lt;br /&gt;
|&lt;br /&gt;
* Out-of-date core components&lt;br /&gt;
* Unsupported core components&lt;br /&gt;
* Expired and/or self-signed certificates&lt;br /&gt;
* Same certificate used on multiple devices&lt;br /&gt;
* Admin web interface concerns&lt;br /&gt;
* Hardcoded or easy to guess credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption key exposure&lt;br /&gt;
* Backdoor accounts&lt;br /&gt;
* Vulnerable services (web, ssh, tftp, etc.)&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Manufacturer Recommendations&lt;br /&gt;
|&lt;br /&gt;
* Ensure that supported and up-to-date software is used by developers&lt;br /&gt;
* Ensure that robust update mechanisms are in place for devices&lt;br /&gt;
* Ensure that certificates are not duplicated across devices and product lines.&lt;br /&gt;
* Ensure supported and up-to-date software is used by developers&lt;br /&gt;
* Develop a mechanism to ensure a new certificate is installed when old ones expire&lt;br /&gt;
* Disable deprecated SSL versions&lt;br /&gt;
* Ensure developers do not code in easy to guess or common admin passwords&lt;br /&gt;
* Ensure services such as SSH have a secure password created&lt;br /&gt;
* Develop a mechanism that requires the user to create a secure admin password during initial device setup&lt;br /&gt;
* Ensure developers do not hard code passwords or hashes&lt;br /&gt;
* Have source code reviewed by a third party before releasing device to production&lt;br /&gt;
* Ensure industry standard encryption or strong hashing is used&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Guidance and Instruction&lt;br /&gt;
|&lt;br /&gt;
* Firmware file analysis&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* Dynamic binary analysis&lt;br /&gt;
* Static binary analysis&lt;br /&gt;
* Static code analysis&lt;br /&gt;
* Firmware emulation&lt;br /&gt;
* File system analysis&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Device Firmware Tools&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/craigz28/firmwalker Firmwalker] &lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://github.com/angr/angr Angr binary analysis framework]&lt;br /&gt;
* [http://binwalk.org/ Binwalk firmware analysis tool]&lt;br /&gt;
* [http://www.binaryanalysis.org/en/home Binary Analysis Tool]&lt;br /&gt;
* [https://github.com/firmadyne/firmadyne Firmadyne]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
Vulnerable Firmware&lt;br /&gt;
|&lt;br /&gt;
* [https://github.com/praetorian-inc/DVRF Damn Vulnerable Router Firmware]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the Firmware Analysis Project? ==&lt;br /&gt;
&lt;br /&gt;
The Firmware Analysis Project provides:&lt;br /&gt;
&lt;br /&gt;
* Security testing guidance for vulnerabilities in the &amp;quot;Device Firmware&amp;quot; attack surface&lt;br /&gt;
* Steps for extracting file systems from various firmware files&lt;br /&gt;
* Guidance on searching a file systems for sensitive of interesting data&lt;br /&gt;
* Information on static analysis of firmware contents&lt;br /&gt;
* Information on dynamic analysis of emulated services (e.g. web admin interface)&lt;br /&gt;
* Testing tool links&lt;br /&gt;
* A site for pulling together existing information on firmware analysis&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Craig Smith&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [https://www.owasp.org/index.php/IoT_Firmware_Analysis IoT Firmware Analysis Primer]&lt;br /&gt;
* [https://otalliance.org/initiatives/internet-things Online Trust Alliance - Internet of Things]&lt;br /&gt;
* [https://people.debian.org/~aurel32/qemu/ Pre-compiled QEMU images]&lt;br /&gt;
* [https://code.google.com/archive/p/firmware-mod-kit/ Firmware Modification Kit]&lt;br /&gt;
* [https://craigsmith.net/episode-11-1-firmware-extraction/ Short Firmware Extraction Video]&lt;br /&gt;
* [https://craigsmith.net/episode-12-1-firmware-emulation-with-qemu/ Firmware Emulation with QEMU]&lt;br /&gt;
* [https://craigsmith.net/episode-18-1-file-extraction-from-network-capture/ File Extraction from Network Capture]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Event Logging Project=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:                   OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Logging Events==&lt;br /&gt;
&lt;br /&gt;
This is a working draft of the recommended minimum IoT Device logging events. This includes many   different types of devices, including consumer IoT, enterprise IoT, and ICS/SCADA type devices.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Event Category&lt;br /&gt;
! Events&lt;br /&gt;
|-&lt;br /&gt;
| '''Request Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Attempt to Invoke Unsupported HTTP Method&lt;br /&gt;
* Unexpected Quantity of Characters in Parameter&lt;br /&gt;
* Unexpected Type of Characters in Parameter&lt;br /&gt;
|-&lt;br /&gt;
| '''Authentication Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Multiple Failed Passwords&lt;br /&gt;
* High Rate of Login Attempts&lt;br /&gt;
* Additional POST Variable&lt;br /&gt;
* Deviation from Normal GEO Location&lt;br /&gt;
|-&lt;br /&gt;
| '''Session Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying the Existing Cookie&lt;br /&gt;
* Substituting Another User's Valid SessionID or Cookie&lt;br /&gt;
* Source Location Changes During Session&lt;br /&gt;
|-&lt;br /&gt;
| '''Access Control Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Modifying URL Argument Within a GET for Direct Object Access Attempt&lt;br /&gt;
* Modifying Parameter Within a POST for Direct Object Access Attempt&lt;br /&gt;
* Forced Browsing Attempt&lt;br /&gt;
|-&lt;br /&gt;
| '''Ecosystem Membership Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Traffic Seen from Disenrolled System&lt;br /&gt;
* Traffic Seen from Unenrolled System&lt;br /&gt;
* Failed Attempt to Enroll in Ecosystem&lt;br /&gt;
* Multiple Attempts to Enroll in Ecosystem&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Access Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Case Tampering Detected&lt;br /&gt;
* Device Logic Board Tampering Detected&lt;br /&gt;
|-&lt;br /&gt;
| '''Administrative Mode Events'''&lt;br /&gt;
|&lt;br /&gt;
* Device Entered Administrative Mode&lt;br /&gt;
* Device Accessed Using Default Administrative Credentials&lt;br /&gt;
|-&lt;br /&gt;
| '''Input Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Double Encoded Character&lt;br /&gt;
* Unexpected Encoding Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Command Injection Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Blacklist Inspection for Common SQL Injection Values&lt;br /&gt;
* Abnormal Quantity of Returned Records&lt;br /&gt;
|-&lt;br /&gt;
| '''Honey Trap Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Honey Trap Resource Requested&lt;br /&gt;
* Honey Trap Data Used&lt;br /&gt;
|-&lt;br /&gt;
| '''Reputation Exceptions'''&lt;br /&gt;
|&lt;br /&gt;
* Suspicious or Disallowed User Source Location&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:  25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Logging Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Secure Logging Project provides a list of core events that should be logged in any IoT-related system. The project exists because IoT systems in general are not logging nearly enough events to constitute input for a solid detection and response program around IoT devices, and for companies that want to do this there are not many good resources for what should be logged.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Daniel Miessler&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSensor_Project The OWASP AppSensor Project]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= ICS/SCADA =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== ICS/SCADA Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP ICS/SCADA Top 10 software weaknesses are as follows:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! Rank and ID&lt;br /&gt;
! Title&lt;br /&gt;
|- &lt;br /&gt;
| '''1 - CWE-119'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|- &lt;br /&gt;
| '''2 - CWE-20'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Input Validation&lt;br /&gt;
|- &lt;br /&gt;
| '''3 - CWE-22'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| '''4 - CWE-264'''&lt;br /&gt;
|&lt;br /&gt;
* Permissions, Privileges, and Access Controls&lt;br /&gt;
|- &lt;br /&gt;
| '''5 - CWE-200'''&lt;br /&gt;
|&lt;br /&gt;
* Information Exposure&lt;br /&gt;
|- &lt;br /&gt;
| '''6 - CWE-255'''&lt;br /&gt;
|&lt;br /&gt;
* Credentials Management&lt;br /&gt;
|- &lt;br /&gt;
| '''7 - CWE-287'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''8 - CWE-399'''&lt;br /&gt;
|&lt;br /&gt;
* Resource Management Errors&lt;br /&gt;
|- &lt;br /&gt;
| '''9 - CWE-79'''&lt;br /&gt;
|&lt;br /&gt;
* Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;br /&gt;
|- &lt;br /&gt;
| '''10 - CWE-189'''&lt;br /&gt;
|&lt;br /&gt;
* Numeric Errors&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the ICS/SCADA Project? ==&lt;br /&gt;
&lt;br /&gt;
The ICS/SCADA Project provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the Top 10 most dangerous software weaknesses&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* NJ Ouchn&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]&lt;br /&gt;
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= IoT Security Policy Project =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== IoT Security Policy Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the IoT Security Policies Project? ==&lt;br /&gt;
&lt;br /&gt;
The IoT Security Policy Project provides:&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* Saša Zdjelar&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
[https://owasp-iot-security.slack.com The Slack Channel]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Coming Soon&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Community =&lt;br /&gt;
&lt;br /&gt;
[https://www.iamthecavalry.org/ I Am The Cavalry] &lt;br /&gt;
&lt;br /&gt;
A global grassroots organization that is focused on issues where computer security intersects public safety and human life.&lt;br /&gt;
&lt;br /&gt;
Their areas of focus include:&lt;br /&gt;
* Medical devices&lt;br /&gt;
* Automobiles&lt;br /&gt;
* Home Electronics&lt;br /&gt;
* Public Infrastructure&lt;br /&gt;
&lt;br /&gt;
[https://otalliance.org Online Trust Alliance]&lt;br /&gt;
&lt;br /&gt;
Formed as an informal industry working group in 2005, today OTA is an Internal Revenue Service (IRS) approved 501c3 charitable organization with the mission to enhance online trust and empower users, while promoting innovation and the vitality of the internet.  OTA is global organization supported by over 100 organizations headquartered in Bellevue, Washington with offices in Washington DC.&lt;br /&gt;
&lt;br /&gt;
Addressing the mounting concerns, in January 2015 the Online Trust Alliance, established the [https://otalliance.org/initiatives/internet-things IoT Trustworthy Working Group (ITWG)], a multi-stakeholder initiative.  The group recognizes “security and privacy by design” must be a priority from the onset of product development and be addressed holistically. The framework focuses on privacy, security sustainability. The sustainability pillar is critical as it looks at the life-cycle issues related to long- term supportability and transfers of ownership of devices and the data collected.&lt;br /&gt;
&lt;br /&gt;
[https://allseenalliance.org/framework AllSeen Alliance]&lt;br /&gt;
&lt;br /&gt;
The AllSeen Alliance is a Linux Foundation collaborative project.  They're a cross-industry consortium dedicated to enabling the interoperability of billions of devices, services and apps that comprise the Internet of Things.  The Alliance supports the AllJoyn Framework, an open source software framework that makes it easy for devices and apps to discover and communicate with each other. Developers can write applications for interoperability regardless of transport layer, manufacturer, and without the need for Internet access. The software has been and will continue to be openly available for developers to download, and runs on popular platforms such as Linux and Linux-based Android, iOS, and Windows, including many other lightweight real-time operating systems.&lt;br /&gt;
&lt;br /&gt;
[http://www.iiconsortium.org/ The Industrial Internet Consortium (IIC)]&lt;br /&gt;
&lt;br /&gt;
The Industrial Internet Consortium is the open membership, international not-for-profit consortium that is setting the architectural framework and direction for the Industrial Internet. Founded by AT&amp;amp;T, Cisco, GE, IBM and Intel in March 2014, the consortium’s mission is to coordinate vast ecosystem initiatives to connect and integrate objects with people, processes and data using common architectures, interoperability and open standards.&lt;br /&gt;
&lt;br /&gt;
[http://securingsmartcities.org/ Securing Smart Cities]&lt;br /&gt;
&lt;br /&gt;
Securing Smart Cities is a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities through collaboration between companies, governments, media outlets, other not-for-profit initiatives and individuals across the world.&lt;br /&gt;
&lt;br /&gt;
===Talks===&lt;br /&gt;
&lt;br /&gt;
RSA Conference San Francisco &amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/images/5/51/RSAC2015-OWASP-IoT-Miessler.pdf Securing the Internet of Things: Mapping IoT Attack Surface Areas with the OWASP IoT Top 10 Project] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler, Practice Principal &amp;lt;br&amp;gt;&lt;br /&gt;
April 21, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
--- &amp;lt;br&amp;gt;&lt;br /&gt;
Defcon 23 &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/images/3/36/IoTTestingMethodology.pdf IoT Attack Surface Mapping] &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Miessler &amp;lt;br&amp;gt;&lt;br /&gt;
August 6-9, 2015&lt;br /&gt;
&lt;br /&gt;
===Podcasts===&lt;br /&gt;
&lt;br /&gt;
* [http://iotpodcast.com/ The Internet of Things Podcast]&lt;br /&gt;
* [http://www.iot-inc.com/ IoT Inc]&lt;br /&gt;
* [https://craigsmith.net/iot-this-week/ IoT This Week]&lt;br /&gt;
* [http://farstuff.com/ Farstuff: The Internet of Things Podcast]&lt;br /&gt;
&lt;br /&gt;
===IoT Conferences===&lt;br /&gt;
&lt;br /&gt;
* [http://www.iotevents.org Internet of Things Events]&lt;br /&gt;
&lt;br /&gt;
Conference Call for Papers&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=internet+of+things&amp;amp;year=t WikiCFP - Internet of Things]&lt;br /&gt;
* [http://www.wikicfp.com/cfp/servlet/tool.search?q=iot&amp;amp;year=t WikiCFP - IoT]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP Internet of Things Project&lt;br /&gt;
| project_description = &lt;br /&gt;
| project_license =CC-BY 3.0 for documentation and GPLv3 for code. &lt;br /&gt;
| leader_name1 = Daniel Miessler&lt;br /&gt;
| leader_email1 = &lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| leader_name2 =Craig Smith&lt;br /&gt;
| leader_email2 = &lt;br /&gt;
| leader_username2 = &lt;br /&gt;
| contributor_name1 = Justin Klein Keane]&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 = Justin_C._Klein_Keane&lt;br /&gt;
| contributor_name2 = Yunsoul&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = Yunsoul&lt;br /&gt;
| mailing_list_name = &lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 =&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231360</id>
		<title>WASPY Awards 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231360"/>
				<updated>2017-07-06T09:17:26Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: adding my profile&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY 2017 Banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Purpose of the Awards==&lt;br /&gt;
&lt;br /&gt;
Each year there are many individuals who do amazing work, dedicating countless hours to share, improve, and strengthen the OWASP mission. Some of these individuals are well known to the community while others are not. &lt;br /&gt;
&lt;br /&gt;
'''The purpose of these awards is to bring recognition to those who &amp;quot;FLY UNDER THE RADAR&amp;quot;. These are the individuals who are passionate about OWASP, who contribute hours of their own free time to the organization to help improve the cyber-security world, yet seem to go unrecognized.''' &lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
Call for Nominees Opens June 7, 2017  &lt;br /&gt;
&lt;br /&gt;
Call for Nominees Closes June 30, 2017 - CLOSED &lt;br /&gt;
&lt;br /&gt;
Announcement of Nominees per Category July 5, 2017 - DONE &lt;br /&gt;
&lt;br /&gt;
Deadline for Nominee Profile Picture and Bio to be created and added to the Nominees section July 10, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Opens July 17, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Closes July 24, 2017  &lt;br /&gt;
&lt;br /&gt;
Winners are Notified July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Announcement of Winners to the Community July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Award Ceremony at AppSecUSA 2017 in Orlando, FL September 21-22, 2017 &lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
The WASPYs celebrate the actors in our community who grow OWASP and drive innovation to the safety and security of the world’s software. This year we are excited to offer three categories.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Community Supporter''' - The WASPY for COMMUNITY honors members who create dynamic INTERACTION and LEARNING opportunities for the OWASP Community.  Nominees to the Community WASPY Award create collaborative and inclusive environments and grow the OWASP Community.  WASPYs focus on the unsung heros of the OWASP community.  Chapter Leaders and Community Members should especially consider leaders and volunteers who bring something extra to the environment, help the chapter reach out to new attendees, or carry out the tedious and repetitive tasks that make growing an OWASP Chapter possible.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Mission Outreach'''  - The WASPY for Mission Outreach honors community members who help the community GROW.  Growth can happen inside the larger OWASP community or outside it in the broader AppSec and development communities.   Leaders and Members should especially consider volunteers who pushed the boundaries of the audience and reach of OWASP to provide new exposure for OWASP’s projects and chapters.  New leaders and volunteers who help bring more people to your chapter, project, or actively represent OWASP at non-OWASP events, gatherings, and activities to build an active OWASP community are ideal candidates for the Mission Outreach WASPY award.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Innovator'''  - The WASPY for Innovation is given to a community member who has contributed to the TECHNICAL advancement of OWASP in the past year.  This advancement is usually through an [[:Category:OWASP Project|OWASP Project]] and can be in the form of code, an application, or anything that materially makes the AppSec community better in a unique way.  WASPYs focus on the unsung heros of the OWASP community who quietly go about making the world a bit better for their work.  Project Leaders and Community Members should especially consider nominating new projects, projects that have recently graduated, and project contributors for this WASPY.&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
'''Remember the purpose of these awards is to recognize the UNSUNG HEROS out there, that are barely recognized for their contributions to the OWASP Foundation.''' &lt;br /&gt;
&lt;br /&gt;
1. [https://www.owasp.org/index.php/About_OWASP#2015_Global_Board_Members Board members] may not be nominated &lt;br /&gt;
&lt;br /&gt;
2. [https://www.owasp.org/index.php/About_OWASP#Employees_and_Contractors_of_the_OWASP_Foundation Employees &amp;amp; Contractors] may not be nominated &lt;br /&gt;
&lt;br /&gt;
3. All nominees will remain anonymous until July 3, 2017&lt;br /&gt;
&lt;br /&gt;
4. Anyone can nominate an &amp;quot;unsung hero&amp;quot; who has contributed in some way to OWASP who they feel best fits each category &lt;br /&gt;
&lt;br /&gt;
5. You may only nominate one person per category &lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; |Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; |Category &amp;amp; Citation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Aatral Arasu&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Sean has not only worked as a volunteer in the local chapter building community, his code projects are useful to the mission and his outreach efforts have included funding requests for OWASP Foundation to grow its mission. Sean is a great example of a community member.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Nicole Becher&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Nicole has been an amazing chapter leader. She brings knowledge and experience teaching cybersecurity to the Mentor Initiative, WIA Committee, and projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Ken Belva&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Ken is a long time chapter leader of the NYC chapter and a former chapter leader of the Brooklyn Chapter. Ken is always willing to step in and volunteer to help with OWASP initiatives and is a frequent participant in OWASP events as both a volunteer and speaker. Ken has spoken at AppSec USA on XSS techniques (&amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=G539NwvpL3I&amp;lt;/nowiki&amp;gt;) and is the project lead for the Basic Expression and Lexicon Variation Algorithms project (&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Basic_Expression_%26_Lexicon_Variation_Algorithms_(BELVA)_Project)&amp;lt;/nowiki&amp;gt;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tony has selflessly brought the OWASP dublin chapter to great nights. He has nurtured the chapter to be inclusive and open whilst growing the average attendee count to hundreds. He has spread the word across both security industry and developer industry and has also managed to get various organisations to work together such as ISACA, IISF, ISSA and ISC2. He is a great leader and despite detractors has built the chapter and awareness of software security issues in a strong vendor neutral manner to a great place. Tony is a great example of OWASP and industry leadership.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dinis Cruz&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Diniz is a fantastic innovator and motivator. As the mastermind and organizer behind the OWASP Summit he has managed to re-energize the OWASP community - many interesting projects would not have happened (or at least, not been that successful) without his passionate work. Besides organizing the event, he also consistently supported project leaders with his experience and ideas.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' Dinis put ridiculous effort (&amp;lt;nowiki&amp;gt;https://github.com/OWASP/owasp-summit-2017/commits?author=DinisCruz&amp;lt;/nowiki&amp;gt;) into the OWASP Summit 2017 and didn't tire promoting this event!&lt;br /&gt;
|-&lt;br /&gt;
|Christian Folini&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Christian Folini is very active in the Core Rule Set project community. He responds to a ton of questions submitted by newcomers when they are stuck and he answers expert level questions with stunning detail. He joined Chaim and Walter when they revived the project in 2016 and I heard he had the idea for the famous CRS3 release poster &amp;lt;nowiki&amp;gt;https://modsecurity.org/crs/poster&amp;lt;/nowiki&amp;gt; that was shared all over the net.  I think it's people like him that give OWASP a human face.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Joaquin Fuentes&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;In 2015, Joaquin took it upon himself to revive the OWASP Phoenix Chapter. He created a meet-up group to gain broader visibility. Since 2015, the meeting attendance has grown from an average of 15 attendees to over 60! Joaquin dedicates a lot of time and effort into scheduling an impressive variety of presentation topics including safe hacking, vulnerability scanner deep dives, hands on web exploitation CTF, video game hacking and more. I learn something new and cool at every event.&lt;br /&gt;
&lt;br /&gt;
More importantly, Joaquin works hard to foster a friendly, inclusive environment. During our hands-on web exploitation session, Joaquin recruited co-works to assist participants with the Security Shephard challenges so no one felt overwhelmed or impossibly stuck. He always takes the time meet and welcome new members. For example, my 17-year-old son attends meetings with me. He looks up to Joaquin as a mentor for a future information security career because Joaquin encourages his learning and offers career guidance.&lt;br /&gt;
&lt;br /&gt;
I highly recommend Joaquin for a WASPY award!! He is a kind, soft spoken person with a passion for sharing information security and helping others!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;He resurrected the Phoenix chapter and has kept it going with great content.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation:''' &amp;quot;Put simply, due to the efforts of Joaquin Fuentes, the Phoenix chapter has risen from the ashes (some pun intended). Before Joaquin took over the chapter there were consistently between 5-10 persons in attendance, Joaquin himself being one of them, and the chapter only met about every 3 months or so. Since Joaquin took over the chapter, we have had fantastic presenters each month, paid for dinners, along with a collaborative, comfortable, and engaging environment to meet in. Even more impressive the attendance has grown to 60+ consistently. Joaquin isn't even done yet! He is more great ideas and plans for the chapter that will undoubtedly contribute to the continued growth and over all quality of this once fallen chapter. When he speaks of where this chapter has come from and his plans for the future, it is undeniable to all that he does so with the passion that a leader must possess to accomplish that which Joaquin has.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''5th Citation:''' &amp;quot;I am sure someone else will write in with Joaquin's email, but I felt the need to second his name on the list. The events he puts together are top notch, have excellent speakers, always have things to eat, and are generally excellent. I almost never miss them. He is actually so gracious about the entire chapter that I am sure he does not get the credit he deserves... the whole show is put on by just him, I think. Yay Joaquin!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''6th Citation:''' &amp;quot;A few years ago, the Phoenix (AZ) OWASP group was basically defunct. As the leader of the Phoenix OWASP group, not only has Joaquin helped to resurrect the group, but we've had great presentations on reverse engineering, secure coding, a hands-on CTF contest with Security Shepherd, etc. Joaquin is a very visible member of the security community being an employee at Early Warning, which not only hosts the OWASP meetings, but also is a sponsor and makes a strong showing at CactusCon every year, the biggest security conference in Arizona.&lt;br /&gt;
&lt;br /&gt;
Our local OWASP group is not strong, going from being non-existent a few years ago to now getting a regular attendance of 40-80 people. I've gotten to know Joaquin through OWASP meetings and other security events in the area I have crossed paths with him, and he is a fine representative and evangelist for the OWASP organization.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''7th Citation:''' &amp;quot;Joaquin is the Phoenix OWASP Chapter leader and regularly plans amazing talks with great speakers for the Phoenix Community. Frequently, the Phoenix OWASP talks will have over 50 attendees which Joaquin manages without a problem! Joaquin also pushes for candidates he is interviewing to be familiar with OWASP before their interview.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''8th Citation:''' &amp;quot;Joaquin is the leader for the Phoenix OWASP, and it is clear that through his leadership the Phoenix OWASP thrives. Joaquin organizes all the meetings, and is constantly working with folks to create an excellent sense of community in the Phoenix area.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''9th Citation:''' &amp;quot;Joaquin has taken the Phoenix OWASP chapter that had not been managed for years and brought it back to life. We consistently see 50+ members coming to our Meetups to talk about AppSec related topics. Joaquin is well connected to the InfoSec groups and has had great success in pulling in new speakers, we have already had a few speakers who are prepping their BlackHat and DefCon talks by giving their presentations to our local chapter. Finally Joaquin does a great job by reaching out to the local colleges and supporting CTF activities to garner interest in pen-testing and the OWASP community. He is a true community supporter and fully deserves a WASPY for his efforts...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''10th Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''11th Citation:''' &amp;quot;As a leader of Phoenix OWASP chapter, Joaquin strives to organize talks and trainings to make people in the valley learn InfoSec and AppSec from experienced individuals. He has always gone a step ahead to conduct OWASP meetings that are informative and hands on. Right from giving Arizona State University (ASU) students an overview of basic InfoSec and career opportunities to organizing a hands on hacking workshop for people in the community, Joaquin has always demonstrated passion and determination to take Phoenix to a better place in the field of Cyber Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''12th Citation:''' &amp;quot;I've attended and participated in three OWASP meetings lead by Joaquin. They are always well organized, offer a great learning experience and considerably contribute to the community. His continuous interest and dedication to the Phoenix chapter do not go unnoticed and are appreciated by all who attend.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''13th Citation:''' &amp;quot;Joaquin restarted the OWASP chapter in Phoenix/Scottsdale. Chapter meetings have grown significantly to where there were about 65 attendees at the most recent meeting with hundreds more on the mailing list (I was at the meeting, but I've only heard about the mailing list). As someone who works with him, I know how dedicated he is to the work of IT security and he's been able to attract top-notch speakers for OWASP meetings.'&lt;br /&gt;
&lt;br /&gt;
'''14th Citation:''' &amp;quot;Joaquin had successfully revived the Phoenix OWASP Chapter. Since, the chapter has excelled from zero to filled audience bringing security talent from all around to speak and educate to security professionals on the many facets of security domains.&lt;br /&gt;
&lt;br /&gt;
Additionally, this has provided a great forum to network with the many security professionals around the community and share their knowledge and strengthen the security community. &lt;br /&gt;
&lt;br /&gt;
Joaquin has provided his unselfish time as an OWASP Chapter leader, and has breathed new life into the Chapter.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''15th Citation:''' &amp;quot;Joaquin does a bang up job of running the Phoenix OWASP chapter. He does a great job of raising awareness and bringing folks from the infosec community into the fold.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''16th Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''17th Citation:''' No citation was submitted&lt;br /&gt;
|-&lt;br /&gt;
|Brendan Gormley&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Throughout the Brendan has not only assisted in making the dublin chapter events happen but taken a lead role. Brendan has organised venues and speakers for these events often going above and beyond to ensure success. Brendan has also been involved in some of the outreach programs the Dublin chapter had been involved in. No task is too big or too small for Brendan and without him I don't believe the Dublin chapter would be what it is.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Jeremy is a dedicated security engineer who contributes to the community as a developer, mentor, contributor and leader. He's one of the smartest people I know - and one of the few who has patience with &amp;quot;the rest of us&amp;quot;. He is generous with his time and knowledge, helping not only to contribute apps and resources, but to build up the community itself.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Akash Mahajan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Akash has been backbone of OWASP bangalore chapter he has done lot of work for evangelizing OWASP. For more than 7 years now he has been working with the chapter and mentored lot of folks. No wonder he is called &amp;quot;the web app security guy&amp;quot;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Dhiraj Mishra - has been contributed and volunteered to, OWASP Mumbai Student chapter and Mumbai local chapter.&lt;br /&gt;
&lt;br /&gt;
He has endorse students to be part of multiple open community, however been an Sudent Chapter leader for OWASP he has discussed and shared multiple Information Security topics start from the scratch and spreading the idea's and awareness via chapter Meets, he has taken multiple session in NULL as well which runs with OWASP local chapter Mumbai, recently he invited Mozilla Club Mumbai to student chapter so that students can go to their area of interest, he always pushup/boost women in infosec. Apart from this he has taken various sessions in different colleges and have shared knowledge about Cyber Security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Denise Murtagh-Dunne&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Denise has been a hugely active member of the Dublin chapter and has been involved in all chapter meeting throughout the year and is ever keen to role up her sleeves and get stuck into work that others shy away from. This includes everything from setting up the meeting tools, organising venues, working with sponsors, getting speakers and assisting speakers in the run up and during events. She's been a very positively influence on the community and chapter and has encouraged other people to get involved. She's constantly updating and posting content on our social media accounts and making sure our members get relevant and interesting content. While in full time employment, Denise gives up family time to contribute to the chapter and ensure OWASP Dublin remains a vibrant and relevant group that engages the developer and security community locally.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Owen Pendlebury has been a key local OWASP volunteer over the last number of years. From being on the local Dublin chapter board to leading the Dublin chapter he regularly hosted and spoke at numerous collaborative and insightful security meetups.&lt;br /&gt;
&lt;br /&gt;
He has also been involved in organising AppSec EU in Rome and more recently co-organised the Belfast conference which was the biggest ever EU conference. As part of organising the conference in Belfast he negotiated that all chapters within Ireland would benefit financially getting a percentage of the conference profits to allow the chapters to bring bigger, better and more collaborative meetings to the Irish OWASP community and grow the communities across the country. &lt;br /&gt;
&lt;br /&gt;
I don’t know where he has found the time but has also been part of the Women in AppSec committee mentoring a number of individuals throughout the year. He took part in the Women in AppSec events in Belfast giving some insightful opinions into how improve attendees career. Owen is an asset that helps to improve Ireland's security community’s capabilities with a real can-do attitude.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mick Ryan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Mick always assists with chapter meetings and works to ensure we give the community good quality sessions. Mick assists will all areas including reaching out to potential speakers, getting info and bios from them, arranging dates and venues, posting on social media and the logistics of the meetings and ensuring speakers have the right cables, meetings run to time, that speakers are happy with everything, taking photos to promote the chapter on social media, encouraging people to speak, printing the chapter and getting people to events! Thanks Mick for your contribution in 2017!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;[https://www.owasp.org/index.php/Sriram Sriram] has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone. Sriram has been tremendously supporting the OWASP Chapter by giving trainings to various college student,  corporates and various chapters..&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Michelle Simpson&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Michelle has done an amazing job with the Belfast chapter and works tirelessly to improve the OWASP community and advocate strong app sec practices. This is very evident from the people attending the chapter events, organisations participating and the very successful AppSecEU conference that was held in Belfast in 2017. Michelle put a huge amount of work and effort into planning and preparation for AppSecEU to ensure the conference was of a high calibre. This was a sustained commitment over the majority of 2017 on top of local chapter commitments. I'd like to nominate Michelle for all the hard work and effort she puts into the chapter. Thanks Michelle!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Steve has been a tremendous supporter of the OWASP dependency-check project and leader on the related dependency-track platform. He is quick to respond to community question, answering with insightful and accurate responses assisting the community in their use of the dependency-check suite of tools.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|John Vargas&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the last 9 years John, together with a very small group of volunteers, has been making efforts to keep the chapter of Lima, Peru. Performing activities such as monthly meetings, internal trainings and participating actively in the OWASP Latam Tour. For the chapters in Latin America to keep afloat these activities with few resources is something very complicated and deserves recognition.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tara Williams&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Tara cares about integrity, inclusion and transparency, she is passionate about making OWASP a better place for all members of the community. With her talents in communications, she is getting the word out about OWASP's benefits to community members and attracting new members to chapter meetings, especially identifying successful pathways to transition meetup members to full members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
'''&amp;quot;'''A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sean mentors, is a speaker, leads projects, is an active chapter leader and chapter Treasurer, participating in meetup events and a great representative at global, regional and external events.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tony has grown the chapter over the last year to a point where hundreds of people are attending meetings. The meetings are organised in advance now and have a theme. There were some really interesting people speaking at the chapter meetings including Simon Singh, James Lyne, Brian Honan and Jane Franklin. He has also engaged support from local companies with a lot more attending and sponsoring the chapter. There is a real buzz at chapter meetings and they're not just death by PowerPoint which they had been in the past.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Christopher Frenz&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;'''Christopher Frenz should be nominated for the Best Mission Outreach WASPY for his work as the Project Lead for the OWASP Anti-Ransomware Guide Project and the OWASP Secure Medical Device Deployment Standard Project. In the wake of WannaCry, anti-ransomware guidance has become more pertinent than ever and the project is regularly updated to keep abreast of the latest ransomware adaptations. Chris regularly shares his anti-ransomware knowledge with the security and healthcare communities and is an advocate for organizations conducting mock ransomware incidents. Chris has shared his knowledge of ransomware protections and of pertinent OWASP resources in numerous venues including articles (&amp;lt;nowiki&amp;gt;https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/&amp;lt;/nowiki&amp;gt;) and conference presentations at both the local and international level (&amp;lt;nowiki&amp;gt;https://iapp.org/conference/iapp-canada-privacy-symposium/sessions/?id=a191a000000zrqPAAQ&amp;lt;/nowiki&amp;gt;). A Spanish version of the guidance is also available. In addition, he has worked to call attention to the need for healthcare facilities to improve the security of their medical device implementations and is responsible for authoring version 1 of the OWASP Secure Medical Device Deployment Standard. The project has really worked to raise awareness of these issues and has been covered by CSO magazine (&amp;lt;nowiki&amp;gt;http://www.csoonline.com/article/3188230/security/how-to-securely-deploy-medical-devices.html&amp;lt;/nowiki&amp;gt;) and other news sources. Chris has given interviews on medical device security for the Cloud Security Alliance and others and will be speaking on medical device security at the Defcon BioHacking Village. Chris is always willing to share his knowledge with all who ask and is an active member of the NYC and Brooklyn OWASP chapters.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Joaquin Fuentes&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation''': &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation''': &amp;quot;My job takes me to many different OWASP Chapters, along with ISSA, CSA, ISACA, etc.&lt;br /&gt;
The Phoenix OWASP Chapter was DEAD before Joaquin volunteered to lead the Chapter a few years ago.&lt;br /&gt;
It is now consistently one of the BEST ITSec community gatherings, and I go out of my way to be in Phoenix for their meetings.&lt;br /&gt;
To put it a different way, at my first Phoenix OWASP meeting there were less than 12 attendees, including myself and the speaker. Last week it was standing room only (75+) *and* there would have been more if Interstate 17 hadn't been closed in both directions at the start of rush-hour.&lt;br /&gt;
Part of the reason Joaquin deserves this award is that he is EXTREMELY knowledgeable about AppSec and many other aspects of data security and he is ALWAYS friendly and willing to share. His day-job is no picnic, but he finds the time to put together great meetings and do it in a way that everybody has a good time.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tanya has been instrumental in outreach in the Ottawa Ontario Canada region building membership and participation in the local OWASP chapter, as well as building bridges with other local organizations (Python user group, Ruby Rails user group, WIA, etc.). Tanya has also been a driver in getting a mentoring program setup via the Ottawa chapter. She has also encouraged participation in local CTF events, presented at local conferences (BSides, etc). Tanya's enthusiasm, support, and interaction is often contagious (in a good way :) ). Lastly, Tanya is a strong advocate or evangelist for OWASP projects, promoting such as appropriate per audience/presentation (including, but not limited to: ZAP, Top 10, SKF).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Tanya Janca is an excellent ambassador for OWASP. Since her entry into the lead team of the OWASP Ottawa chapter, she has doubled the size of the chapter and developed the chapter into a meeting place for dozens of women interested in Application Security.&lt;br /&gt;
Tanya Janca is an energetic speaker who held a fantastic presentation at AppSecEU in Belfast. &amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=mPTmuaC2lOI&amp;lt;/nowiki&amp;gt; She was subsequently invited to the Swiss Cyberstorm Conference where her addition to the rooster was explained in an admiring blogpost &amp;lt;nowiki&amp;gt;https://swisscyberstorm.com/2017/05/23/Introducing_Tany_Janca.html&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Tanya Janca has the ability to talk security to techies and management alike. She is pushing for the adoption of OWASP practices and project by the government of Canada her employer. Having received the Government of Canada’s CIO Award for “Excellent in Security” in 2016 she refused to move into the private sector, but continues to support the security community inside the public sector, where her excellent know-how is very important.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Kitisak Jirawannakool&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Web security is notoriously bad in Thailand, so an actives security community is sorely needed. Kitisak is a central figure in that community. He has worked on establishing the OWASP Bangkok chapter for the past six years, organizing meetups, community outreach and engaging with security experts internationally. His work has played a pivotal role in creating IT security awareness in the fast-growing South-East-Asian country.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|James Manico&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Jim's influence on OWASP materials (and therefore on application security) is amazing - he's cited on nearly every cheat sheet on OWASP Top 10 document. His name is synonymous with application security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation: &amp;quot;'''While Jim may not be the &amp;quot;unsung hero&amp;quot; - he is the first and foremost cheerleader/champion of OWASP. His efforts and contributions are innumerable. As anyone who knows Jim - he is not a reserved individual when touting the resources available via OWASP. He has likely done more then anyone else working with OWASP to bring together, motivate, and get individuals to contribute to OWASP. From the immensely popular checklists to motivating individuals to contribute. OWASP would not be nearly as successful as it has been without Jim.&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|Mateo Martinez&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Mateo is one of the leaders in Latin America more recognized, during the last years his efforts to join the chapters chapter along with other leaders of Latam made that the community grew and that today the Latam Tour 2017 has more than 15 participating countries. He also managed to spread the spirit of owasp and help establish new chapters in the region.&lt;br /&gt;
The effort to maintain more communication between OWASP GLobal and local communities is reflected in each activity that encourages other leaders to ensure that they strive every day to spread Owasp projects and to grow the community.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Miller&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The OWASP Podcast is a effort that is in line with the mission of OWASP raising visability for software security. This is a VERY powerful voice in the community globally and Mark Miller should be applauded for his efforts on this&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Podcast&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj was nominated for WASPY 2016, his contribution to the community is from past one 'n half year in various areas, start from the projects, local volunteering and what not, he was also listed in OWASP Hall Of Fame.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Owen is an active participator in OWASP meetings and has been a great inspiration to me.&lt;br /&gt;
He has shown himself to be a great leader and OWASP advocate.&lt;br /&gt;
Owen has recommended other AppSec communities in which I have become involved in since moving to Dublin. He is an evangelist for women in technology and I have witnessed this first hand.&lt;br /&gt;
I don't hesitate to recommend Owen for this award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Owen has introduced me to the OWASP Community in Ireland and EU. Help me to get involve with Women in AppSec and participate in the AppSec EU event in Belfast. He is a great leader, who enjoys talking about OWASP and the great community behind it.&lt;br /&gt;
I've moved to Ireland a couple of months ago, and getting to know Owen and the OWASP community has completely changed my life, both professionally and personally. &lt;br /&gt;
So, yes, I would like to nominate Owen Pendlebury because he the proof that Women in AppSec is not just a women matter. :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram Shyam]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sriram has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Noreen Whysell&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Noreen is helping each day to improve OWASP members' experiences bringing her expertise and knowledge as a mentor and projects as a Chapter Leader, one member at a time. She understands what members want, how to improve member benefits and is applying that knowledge to improving local and global member experiences from the ground up. Her efforts are multiplied by her sharing of knowledge and grassroots approach creating a membership groundswell.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Sean leads the BLT Project and is a Team Leader for the Learning Gateway project. He has helped improve the quality of web experiences, including OWASP.org .&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Glenn &amp;amp; Riccardo ten Cate&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;I am hereby nominating the brothers Glenn &amp;amp; Riccardo ten Cate from the Netherlands for the WASPY award in this category. They are known for their work on the open-source project SKF (Security Knowledge Framework). These are two guys who are dedicated to spreading security knowledge trough the means OWASP has to offer. You might have encountered them talking at seminars, promoting their project and OWASP, or different companies where they teach development teams how to integrate the OWASP core principles in their workflow using their project. Not only professional development teams but also students of security can only be amazed at the sheer knowledge they gathered and contribute to the global OWASP community trough open source. The sheer effort they put in this project teaches, guides, structures and shows by example how to test and write secure applications by design. There is no other software out there that does this. And that is why they deserve this nomination for best innovator 2017.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Deenihan&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Mark for his constant devotion and work on the OWASP security shepherd project and continuing to develop it and teach people globally about app sec.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Seba Deleersnyder&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;One of the main projects to date is SAMM. Seba with the support of project colliders has made this a flagship project of OWASP. The level of maturity and the number of improvements obtained indicates that this project is one of the most mature and a great projection to the future.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Christopher Frenz&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Chris' projects are opening doors for OWASP in the standards development and getting the word out about important IoT with his Medical Device Deployment Standard: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Secure_Medical_Device_Deployment_Standard&amp;lt;/nowiki&amp;gt; which already has a Turkish translation and attracted attention from the Turkish public health department. He has delivered presentations at meetups, and presenting to the IDESG, www.idesg.org in July. He has a &amp;quot;soup label&amp;quot; tool that gives simple guidance for the implementation of the OSMDDS. This is not Chris' first project but it is surely one of the best OWASP innovations of the year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Joaquin Fuentes&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Brian Glas&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Brian has been paramount in 2 very strategic initiatives for OWASP. He is not only a Project Leader for the OWASP SAMM project but he has been instrumental in revamping the call for data and reorganizing the flagship OWASP Top Ten. Brian continues to support and speak about the benefits of supporting OWASP especially projects and participating in the Summit. Please consider Brian Glas as the Best Community Supporter for this year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Evin Hernandez&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Evins focus on the core of the information security platform with Virtual Village has provided the global community with a place to experiment and leverage for testing... &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Virtual_Village_Project&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Considering how often projects have a great start and plateau, we should recognize the ongoing effort and dedication given to one of the Flagship projects in our community.&lt;br /&gt;
Jeremy Long has continued to not only maintain the Dependency Check project but develop and improve it each year.&lt;br /&gt;
This year he added Improvements in the core dependency-check platform in terms of code quality, achieved 100% for the CII Best Practices for dependency-check, continued to develop the ODC community with several contributors submitting PRs, and over the last several months he's been working on platform maturity and will be releasing 2.0.0 in the first half of July 2017.&lt;br /&gt;
After 2.0 is released he has planned work on Python support and expanding the tool by integrating additional data-sources such as Artifactory, Redhat Victim's, OSS-Index, etc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Jeremy has been an avid contributor/leader for the OWASP dependency-check project. Under his leadership the project has garnered substantial community support in terms of pull requests, improved code quality via Sonarcloud, Coverity, Codacy, and CII Best Practices. While the last six months have been primarily around code quality and bug fixes; these improvements are setting the dependency-check project up for major enhancements over the coming months!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Daniel Miessler&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Daniel seems to be everywhere at once - despite have a full-time job, he is leading or co-leading several OWASP projects, has created ideas for groups out of thin air, and has performed work in much needed areas.&lt;br /&gt;
This year, Daniel has lead or co-lead the Internet of Things security project, completed an IoT: Medical Devices attack surface overview, and created the Game Security project.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj is one of the top contributor in OWASP Cheat Sheet Project, which have security guidance in an easy read format, his contribution for SQL Injection WAF Bypass and XSS Evasion - OWASP, was mostly recommended and used by Cyber Security professional, dhiraj has contributed to Benchmark project by contributing SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring and many such projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Bernhard Mueller&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;During the last 18 months Bernhard has been spearheading the OWASP Mobile Testing Guide Project. He has invested several man-months of writing, editing, reviewing, rallying authors, and pushing the project into new directions. This also resulted in the novel agile book writing process and book production pipeline which enables OWASP to produce a professional tech book. The project has produced a security standard and early-release ebook, and is on track become one of OWASP's main flagship projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Steve's work on dependency-track is fantastic - he's moved forward to address the next round of issues, with an innovative solution all companies can leverage.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|thc202&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Simon Bennets &amp;quot;wingman&amp;quot; in the ZAP project, by now even the top committer in the project! (&amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/graphs/contributors&amp;lt;/nowiki&amp;gt;) So &amp;quot;unsung of&amp;quot; that I do not even know his real name!&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Coming July 25, 2017&lt;br /&gt;
&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!&lt;br /&gt;
&lt;br /&gt;
Sponsorships coming soon!&lt;br /&gt;
&lt;br /&gt;
==Communication==&lt;br /&gt;
# June 7, 2017 Email to the Leaders &amp;amp; Community list. Posted to the OWASP [https://owasp.blogspot.com/2017/06/nominations-are-now-being-accepted-for.html Blog]&lt;br /&gt;
# June 30, 2017 Email to the Leaders &amp;amp; Community list.&lt;br /&gt;
# July 5, 2017 Email to the Nominees&lt;br /&gt;
# July 5, 2017 Email to the Leaders &amp;amp; Community list, and Blog post announcing the nominees have been announced.&lt;br /&gt;
&lt;br /&gt;
=='''Past WASPY Awards'''==&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2016 2016]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2015 2015] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2014 2014] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2013 2013] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2012 2012] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=231359</id>
		<title>User:Owen Pendlebury</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=231359"/>
				<updated>2017-07-06T09:15:46Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OwenPendlebury.jpg|left|]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Owen graduated in 2009 from Dundalk Institute of Technology, with a degree in Computer Applications and Support and an honours degree in IT Management specialising in web application development and networking. In 2009, Owen completed an MSc in Security &amp;amp; Forensic Computing from Dublin City University.&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 7 years. Some of the projects that Owen has been involved in include, AppSec EU 2016/2017 Committee/ Training Committee chair , DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars, Cyber Security Summer Camp for school kids and OWASP Women in AppSec Committee/ mentoring. &lt;br /&gt;
&lt;br /&gt;
Owen has over 7 years’ penetration testing experience, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland.&lt;br /&gt;
&lt;br /&gt;
Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
&lt;br /&gt;
Owen has also performed numerous web application, network, mobile, specialised technologies (ATM), device penetration tests for major organisations in the financial services, banking and pharmaceutical sectors, consisting of ‘black-box’, ‘white-box’ and ‘grey-box’ testing.  &lt;br /&gt;
&lt;br /&gt;
'''References'''&lt;br /&gt;
&lt;br /&gt;
'''John Doherty Msc Security &amp;amp; Forensic Computing'''&lt;br /&gt;
&lt;br /&gt;
Owen was my lecturer for Security in NCI. His class and teaching made me seek a further interest in the cyber security field. Even after college I kept in touch with him and he gave me advice and encouraged me to do a masters in security in DCU. &lt;br /&gt;
&lt;br /&gt;
Since then Owen pointed me to the OWASP mailing list which keeps me updated on chapter meetings which I regularly attend and also cyber security job postings and courses. The speakers that have attended have been very interesting and informative. &lt;br /&gt;
&lt;br /&gt;
Owen is now advising/helping me with my DCU masters practicum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''‪Mark Denihan OWASP Security Shepherd Project Lead'''&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''Fabio Cerullo Managing Director at Cycubix'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
‪'''Jason flood CTO of Security Gamification at IBM'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230911</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230911"/>
				<updated>2017-06-22T19:48:58Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Bev Corwin&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator====&lt;br /&gt;
*Wendy Istvanick&lt;br /&gt;
*Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2017 ==&lt;br /&gt;
Women in AppSec is kicking it up a notch at AppSec EU 2017 and we want YOU to join us! Make sure you stop by during the week to check out our events and to learn more about the group.&lt;br /&gt;
&lt;br /&gt;
Events are free to attend and do not require a conference ticket.&lt;br /&gt;
&lt;br /&gt;
Monday, May 8, 2017 6:00-9:00 pm Networking Session&lt;br /&gt;
&lt;br /&gt;
On Monday 8th May at 6:00 pm in the Waterfront Conference Centre, we will have a group of mentors each give a brief talk about their experience followed by an &amp;quot;unconference&amp;quot; event. During the &amp;quot;unconference&amp;quot; event, we will break into groups to discuss popular technical topics. This will be a fantastic opportunity to engage in mentoring relationships and hear from women in the field. You can sign up for this free event on Meetup.com here:  &amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Belfast/events/238434511/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Thursday, May 11, 2017 7:30-8:45 a.m. Mentoring Breakfast&lt;br /&gt;
&lt;br /&gt;
Join us at our pre-conference WiA breakfast in the Waterfront Conference Centre at 7.30 am on Thursday 11th May. A light breakfast will be provided for table discussions on various topics. This will also be a second opportunity to chat with anyone you didn't get to during the Monday evening event. Details to register for this event will be available soon, it will also be free to attend.&lt;br /&gt;
&lt;br /&gt;
=== Wondering what to expect? ===&lt;br /&gt;
Organisers Michelle and Claire discuss what you can expect here:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://drive.google.com/open?id=0B3mw0mZ4CcgtbG5FUDJxbzVqX28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Interested in being a Mentor? ===&lt;br /&gt;
We’re looking for mentors to participate in both events. Both men and women are invited to contribute as mentors. This is the commitment we’re asking for:&lt;br /&gt;
* A picture and bio for the website&lt;br /&gt;
* A time commitment of two hours between the two events&lt;br /&gt;
** 30+ minutes at the networking event&lt;br /&gt;
** 1½ hours at the mentoring breakfast&lt;br /&gt;
Let us know if you’re interested in joining us!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSfy0qx9hnkJiCiceeUDmaq78i9aYXeGsHNv9B95Z_ZeN5Z_KA/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not sure if you’re interested yet? Provide your email address for updates as they become available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSc2DYBKcGzESX6U8-Syohqvm_g7bLLyTBPaw5E7sUj5KO3O4A/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We look forward to seeing you at AppSec EU 2017!'''&lt;br /&gt;
&lt;br /&gt;
=== Meet the EU WIA planning team ===&lt;br /&gt;
*  === Michelle Simpson === Security Consultant at NCC Group&lt;br /&gt;
*  === Claire Burn === Field Applications Engineer at Titan-IC&lt;br /&gt;
*  === Cathy Hall === Principal Consultant at Sila Solutions Group&lt;br /&gt;
*  === Owen Pendelbury === Manager Cyber Risk Services - Penetration Testing @ Deloitte&lt;br /&gt;
*  === Zoe Braiterman === Business Studies graduate from Drew University&lt;br /&gt;
*  === Wendy Istvanick === Object Tactician at ThoughtWorks&lt;br /&gt;
*  === Fiona Collins === IT Security Engineer, Staff at Qualcomm&lt;br /&gt;
*  === Bev Corwin === Director of Technology at DDC&lt;br /&gt;
*  === Loredana Mancini === Chief Operation Officer at ITWAY&lt;br /&gt;
*  === Emily Verwee === Online Project Manager at The Arc of the United States&lt;br /&gt;
*  === Tiffany Long === Community Manager at OWASP&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230910</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230910"/>
				<updated>2017-06-22T19:47:33Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Bev Corwin&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator====&lt;br /&gt;
*Wendy Istvanick&lt;br /&gt;
*Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2017 ==&lt;br /&gt;
Women in AppSec is kicking it up a notch at AppSec EU 2017 and we want YOU to join us! Make sure you stop by during the week to check out our events and to learn more about the group.&lt;br /&gt;
&lt;br /&gt;
Events are free to attend and do not require a conference ticket.&lt;br /&gt;
&lt;br /&gt;
Monday, May 8, 2017 6:00-9:00 pm Networking Session&lt;br /&gt;
&lt;br /&gt;
On Monday 8th May at 6:00 pm in the Waterfront Conference Centre, we will have a group of mentors each give a brief talk about their experience followed by an &amp;quot;unconference&amp;quot; event. During the &amp;quot;unconference&amp;quot; event, we will break into groups to discuss popular technical topics. This will be a fantastic opportunity to engage in mentoring relationships and hear from women in the field. You can sign up for this free event on Meetup.com here:  &amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Belfast/events/238434511/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Thursday, May 11, 2017 7:30-8:45 a.m. Mentoring Breakfast&lt;br /&gt;
&lt;br /&gt;
Join us at our pre-conference WiA breakfast in the Waterfront Conference Centre at 7.30 am on Thursday 11th May. A light breakfast will be provided for table discussions on various topics. This will also be a second opportunity to chat with anyone you didn't get to during the Monday evening event. Details to register for this event will be available soon, it will also be free to attend.&lt;br /&gt;
&lt;br /&gt;
== Wondering what to expect? ==&lt;br /&gt;
Organisers Michelle and Claire discuss what you can expect here:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://drive.google.com/open?id=0B3mw0mZ4CcgtbG5FUDJxbzVqX28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Interested in being a Mentor? ==&lt;br /&gt;
We’re looking for mentors to participate in both events. Both men and women are invited to contribute as mentors. This is the commitment we’re asking for:&lt;br /&gt;
* A picture and bio for the website&lt;br /&gt;
* A time commitment of two hours between the two events&lt;br /&gt;
** 30+ minutes at the networking event&lt;br /&gt;
** 1½ hours at the mentoring breakfast&lt;br /&gt;
Let us know if you’re interested in joining us!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSfy0qx9hnkJiCiceeUDmaq78i9aYXeGsHNv9B95Z_ZeN5Z_KA/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not sure if you’re interested yet? Provide your email address for updates as they become available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSc2DYBKcGzESX6U8-Syohqvm_g7bLLyTBPaw5E7sUj5KO3O4A/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We look forward to seeing you at AppSec EU 2017!'''&lt;br /&gt;
&lt;br /&gt;
== Meet the EU WIA planning team ==&lt;br /&gt;
*  === Michelle Simpson === Security Consultant at NCC Group&lt;br /&gt;
*  === Claire Burn === Field Applications Engineer at Titan-IC&lt;br /&gt;
*  === Cathy Hall === Principal Consultant at Sila Solutions Group&lt;br /&gt;
*  === Owen Pendelbury === Manager Cyber Risk Services - Penetration Testing @ Deloitte&lt;br /&gt;
*  === Zoe Braiterman === Business Studies graduate from Drew University&lt;br /&gt;
*  === Wendy Istvanick === Object Tactician at ThoughtWorks&lt;br /&gt;
*  === Fiona Collins === IT Security Engineer, Staff at Qualcomm&lt;br /&gt;
*  === Bev Corwin === Director of Technology at DDC&lt;br /&gt;
*  === Loredana Mancini === Chief Operation Officer at ITWAY&lt;br /&gt;
*  === Emily Verwee === Online Project Manager at The Arc of the United States&lt;br /&gt;
*  === Tiffany Long === Community Manager at OWASP&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230909</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230909"/>
				<updated>2017-06-22T19:45:14Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: added EU 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Bev Corwin&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator====&lt;br /&gt;
*Wendy Istvanick&lt;br /&gt;
*Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2017 ==&lt;br /&gt;
Women in AppSec is kicking it up a notch at AppSec EU 2017 and we want YOU to join us! Make sure you stop by during the week to check out our events and to learn more about the group.&lt;br /&gt;
&lt;br /&gt;
Events are free to attend and do not require a conference ticket.&lt;br /&gt;
&lt;br /&gt;
Monday, May 8, 2017&lt;br /&gt;
&lt;br /&gt;
6:00-9:00 pm&lt;br /&gt;
&lt;br /&gt;
Networking Session&lt;br /&gt;
&lt;br /&gt;
On Monday 8th May at 6:00 pm in the Waterfront Conference Centre, we will have a group of mentors each give a brief talk about their experience followed by an &amp;quot;unconference&amp;quot; event. During the &amp;quot;unconference&amp;quot; event, we will break into groups to discuss popular technical topics. This will be a fantastic opportunity to engage in mentoring relationships and hear from women in the field. You can sign up for this free event on Meetup.com here:  &amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Belfast/events/238434511/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Thursday, May 11, 2017&lt;br /&gt;
&lt;br /&gt;
7:30-8:45 a.m.&lt;br /&gt;
&lt;br /&gt;
Mentoring Breakfast&lt;br /&gt;
&lt;br /&gt;
Join us at our pre-conference WiA breakfast in the Waterfront Conference Centre at 7.30 am on Thursday 11th May. A light breakfast will be provided for table discussions on various topics. This will also be a second opportunity to chat with anyone you didn't get to during the Monday evening event. Details to register for this event will be available soon, it will also be free to attend.&lt;br /&gt;
&lt;br /&gt;
== Wondering what to expect? ==&lt;br /&gt;
Organisers Michelle and Claire discuss what you can expect here:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://drive.google.com/open?id=0B3mw0mZ4CcgtbG5FUDJxbzVqX28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Interested in being a Mentor? ==&lt;br /&gt;
We’re looking for mentors to participate in both events. Both men and women are invited to contribute as mentors. This is the commitment we’re asking for:&lt;br /&gt;
* A picture and bio for the website&lt;br /&gt;
* A time commitment of two hours between the two events&lt;br /&gt;
** 30+ minutes at the networking event&lt;br /&gt;
** 1½ hours at the mentoring breakfast&lt;br /&gt;
Let us know if you’re interested in joining us!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSfy0qx9hnkJiCiceeUDmaq78i9aYXeGsHNv9B95Z_ZeN5Z_KA/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not sure if you’re interested yet? Provide your email address for updates as they become available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSc2DYBKcGzESX6U8-Syohqvm_g7bLLyTBPaw5E7sUj5KO3O4A/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We look forward to seeing you at AppSec EU 2017!'''&lt;br /&gt;
&lt;br /&gt;
== Meet the EU WIA planning team ==&lt;br /&gt;
*  === Michelle Simpson === Security Consultant at NCC Group&lt;br /&gt;
*  === Claire Burn === Field Applications Engineer at Titan-IC&lt;br /&gt;
*  === Cathy Hall === Principal Consultant at Sila Solutions Group&lt;br /&gt;
*  === Owen Pendelbury === Manager Cyber Risk Services - Penetration Testing @ Deloitte&lt;br /&gt;
*  === Zoe Braiterman === Business Studies graduate from Drew University&lt;br /&gt;
*  === Wendy Istvanick === Object Tactician at ThoughtWorks&lt;br /&gt;
*  === Fiona Collins === IT Security Engineer, Staff at Qualcomm&lt;br /&gt;
*  === Bev Corwin === Director of Technology at DDC&lt;br /&gt;
*  === Loredana Mancini === Chief Operation Officer at ITWAY&lt;br /&gt;
*  === Emily Verwee === Online Project Manager at The Arc of the United States&lt;br /&gt;
*  === Tiffany Long === Community Manager at OWASP&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230908</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230908"/>
				<updated>2017-06-22T19:13:29Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Bev Corwin&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator====&lt;br /&gt;
*Wendy Istvanick&lt;br /&gt;
*Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Owen_Pendlebury_2016_Bio_%26_Why_Me%3F&amp;diff=221351</id>
		<title>Owen Pendlebury 2016 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Owen_Pendlebury_2016_Bio_%26_Why_Me%3F&amp;diff=221351"/>
				<updated>2016-09-16T10:52:17Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''About Owen:'''&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 6.5 years. Some of the projects that Owen has been involved in include, AppSec EU 2016 Committee/ Training Committee, AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars and numerous security workshops.&lt;br /&gt;
&lt;br /&gt;
Owen has over 6.5 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland.&lt;br /&gt;
&lt;br /&gt;
Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Why I would like to be elected to the Global OWASP Foundation Board of Directors'''&lt;br /&gt;
&lt;br /&gt;
I am extremely passionate about OWASP and the community. My main goal is to improve Europe’s/ global security capabilities and I feel I achieve this with a real can-do attitude. I would use my position on the board to ensure that Europe has an equal say and are aligned with OWASPs strategic goals. I have recently handed on the leadership baton for the Irish OWASP chapter to Tony Clarke and would relish the opportunity to get involved at a global level.&lt;br /&gt;
&lt;br /&gt;
The main areas in which I feel I can aid in improving within OWASP globally are;&lt;br /&gt;
&lt;br /&gt;
'''Projects''' – focus on projects new, immature and mature aiding these projects to progress to flagship OWASP projects. I feel that there are a number of key projects that have been left in incubator status for way too long. We need work with these projects in order for OWASP to grow. Existing projects need to be encouraged to grow.&lt;br /&gt;
&lt;br /&gt;
'''Governance''' – Enable chapters and new OWASP members to flourish without the shadow of big names. OWASP is about the community and we need to focus on the community. Chapters need to be empowered to grow. We need to be transparent in all our actions.&lt;br /&gt;
&lt;br /&gt;
'''Education''' – I feel that OWASP can reach further in the community. Not only to security professionals but to students. Students both in college and at high school levels should be empowered to join OWASP and learn from our community. We should stimulate enough interest at Community level to cause student volunteers to engage &amp;amp; participate.&lt;br /&gt;
&lt;br /&gt;
'''Build relationships''' with industry, government, and educational institutions&lt;br /&gt;
&lt;br /&gt;
'''Support''' the overall OWASP community and its various activities&lt;br /&gt;
&lt;br /&gt;
Increasing the '''awareness''' of OWASP outside the security community&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''References'''&lt;br /&gt;
&lt;br /&gt;
‪'''Mark Denihan - OWASP Security Shepherd Project Lead'''&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
'''Fabio Cerullo - ‪Managing Director at Cycubix'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
‪‪'''Jason flood - ‪CEO of Security Gamification at IBM'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Owen_Pendlebury_2016_Bio_%26_Why_Me%3F&amp;diff=221350</id>
		<title>Owen Pendlebury 2016 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Owen_Pendlebury_2016_Bio_%26_Why_Me%3F&amp;diff=221350"/>
				<updated>2016-09-16T10:48:01Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''About Owen:'''&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 6.5 years. Some of the projects that Owen has been involved in include, AppSec EU 2016 Committee/ Training Committee, AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars and numerous security workshops.&lt;br /&gt;
&lt;br /&gt;
Owen has over 6.5 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland.&lt;br /&gt;
&lt;br /&gt;
Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Why I would like to be elected to the Global OWASP Foundation Board of Directors'''&lt;br /&gt;
&lt;br /&gt;
I am extremely passionate about OWASP and the community. My main goal is to improve Europe’s/ global security capabilities and I feel I achieve this with a real can-do attitude. I would use my position on the board to ensure that Europe has an equal say and are aligned with OWASPs strategic goals. I have recently handed on the leadership baton for the Irish OWASP chapter to Tony Clarke and would relish the opportunity to get involved at a global level.&lt;br /&gt;
&lt;br /&gt;
The main areas in which I feel I can aid in improving within OWASP globally are;&lt;br /&gt;
&lt;br /&gt;
'''Projects''' – focus on projects new, immature and mature aiding these projects to progress to flagship OWASP projects. I feel that there are a number of key projects that have been left in incubator status for way too long. We need work with these projects in order for OWASP to grow. Existing projects need to be encouraged to grow.&lt;br /&gt;
&lt;br /&gt;
'''Governance''' – Enable chapters and new OWASP members to flourish without the shadow of big names. OWASP is about the community and we need to focus on the community. Chapters need to be empowered to grow. We need to be transparent in all our actions.&lt;br /&gt;
&lt;br /&gt;
'''Education''' – I feel that OWASP can reach further in the community. Not only to security professionals but to students. Students both in college and at high school levels should be empowered to join OWASP and learn from our community. We should stimulate enough interest at Community level to cause student volunteers to engage &amp;amp; participate.&lt;br /&gt;
&lt;br /&gt;
'''Build relationships''' with industry, government, and educational institutions&lt;br /&gt;
&lt;br /&gt;
'''Support''' the overall OWASP community and its various activities&lt;br /&gt;
&lt;br /&gt;
Increasing the '''awareness''' of OWASP outside the security community&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''References'''&lt;br /&gt;
&lt;br /&gt;
‪Mark Denihan - OWASP Security Shepherd Project Lead&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
Fabio Cerullo - ‪Managing Director at Cycubix&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
‪‪Jason flood - ‪CEO of Security Gamification at IBM&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Owen_Pendlebury_2016_Bio_%26_Why_Me%3F&amp;diff=221349</id>
		<title>Owen Pendlebury 2016 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Owen_Pendlebury_2016_Bio_%26_Why_Me%3F&amp;diff=221349"/>
				<updated>2016-09-16T10:46:06Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''About Owen:'''&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 6.5 years. Some of the projects that Owen has been involved in include, AppSec EU 2016 Committee/ Training Committee, AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars and numerous security workshops.&lt;br /&gt;
&lt;br /&gt;
Owen has over 6.5 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland.&lt;br /&gt;
&lt;br /&gt;
Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Why I would like to be elected to the Global OWASP Foundation Board of Directors'''&lt;br /&gt;
&lt;br /&gt;
I am extremely passionate about OWASP and the community. My main goal is to improve Europe’s/ global security capabilities and I feel I achieve this with a real can-do attitude. I would use my position on the board to ensure that Europe has an equal say and are aligned with OWASPs strategic goals. I have recently handed on the leadership baton for the Irish OWASP chapter to Tony Clarke and would relish the opportunity to get involved at a global level.&lt;br /&gt;
&lt;br /&gt;
The main areas in which I feel I can aid in improving within OWASP globally are;&lt;br /&gt;
&lt;br /&gt;
'''Projects''' – focus on projects new, immature and mature aiding these projects to progress to flagship OWASP projects. I feel that there are a number of key projects that have been left in incubator status for way too long. We need work with these projects in order for OWASP to grow. Existing projects need to be encouraged to grow.&lt;br /&gt;
&lt;br /&gt;
'''Governance''' – Enable chapters and new OWASP members to flourish without the shadow of big names. OWASP is about the community and we need to focus on the community. Chapters need to be empowered to grow. We need to be transparent in all our actions.&lt;br /&gt;
&lt;br /&gt;
'''Education''' – I feel that OWASP can reach further in the community. Not only to security professionals but to students. Students both in college and at high school levels should be empowered to join OWASP and learn from our community. We should stimulate enough interest at Community level to cause student volunteers to engage &amp;amp; participate.&lt;br /&gt;
&lt;br /&gt;
'''Build relationships''' with industry, government, and educational institutions&lt;br /&gt;
&lt;br /&gt;
'''Support''' the overall OWASP community and its various activities&lt;br /&gt;
&lt;br /&gt;
Increasing the '''awareness''' of OWASP outside the security community&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''References'''&lt;br /&gt;
&lt;br /&gt;
‪Mark Denihan&lt;br /&gt;
&lt;br /&gt;
OWASP Security Shepherd Project Lead&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Fabio Cerullo&lt;br /&gt;
&lt;br /&gt;
‪Managing Director at Cycubix&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
‪&lt;br /&gt;
&lt;br /&gt;
‪Jason flood&lt;br /&gt;
&lt;br /&gt;
‪CEO of Security Gamification at IBM&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to&lt;br /&gt;
&lt;br /&gt;
improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=220034</id>
		<title>User:Owen Pendlebury</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=220034"/>
				<updated>2016-08-05T16:30:40Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OwenPendlebury.jpg|left|]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Owen graduated in 2009 from Dundalk Institute of Technology, with a degree in Computer Applications and Support and an honours degree in IT Management specialising in web application development and networking. In 2009, Owen completed an MSc in Security &amp;amp; Forensic Computing from Dublin City University.&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 7 years. Some of the projects that Owen has been involved in include, AppSec EU 2016/2017 Committee/ Training Committee , AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars, Cyber Security Summer Camp for school kids  and numerous security workshops.&lt;br /&gt;
&lt;br /&gt;
Owen has over 7 years’ penetration testing experience, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland.&lt;br /&gt;
&lt;br /&gt;
Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
&lt;br /&gt;
Owen has also performed numerous web application, network, mobile, specialised technologies (ATM), device penetration tests for major organisations in the financial services, banking and pharmaceutical sectors, consisting of ‘black-box’, ‘white-box’ and ‘grey-box’ testing.  &lt;br /&gt;
&lt;br /&gt;
'''References'''&lt;br /&gt;
&lt;br /&gt;
'''John Doherty Msc Security &amp;amp; Forensic Computing'''&lt;br /&gt;
&lt;br /&gt;
Owen was my lecturer for Security in NCI. His class and teaching made me seek a further interest in the cyber security field. Even after college I kept in touch with him and he gave me advice and encouraged me to do a masters in security in DCU. &lt;br /&gt;
&lt;br /&gt;
Since then Owen pointed me to the OWASP mailing list which keeps me updated on chapter meetings which I regularly attend and also cyber security job postings and courses. The speakers that have attended have been very interesting and informative. &lt;br /&gt;
&lt;br /&gt;
Owen is now advising/helping me with my DCU masters practicum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''‪Mark Denihan OWASP Security Shepherd Project Lead'''&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''Fabio Cerullo Managing Director at Cycubix'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
‪'''Jason flood CTO of Security Gamification at IBM'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=220032</id>
		<title>User:Owen Pendlebury</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=220032"/>
				<updated>2016-08-05T14:54:29Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OwenPendlebury.jpg|left|]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Owen graduated in 2009 from Dundalk Institute of Technology, with a degree in Computer Applications and Support and an honours degree in IT Management specialising in web application development and networking. In 2009, Owen completed an MSc in Security &amp;amp; Forensic Computing from Dublin City University.&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 7 years. Some of the projects that Owen has been involved in include, AppSec EU 2016/2017 Committee/ Training Committee , AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars, Cyber Security Summer Camp for school kids  and numerous security workshops.&lt;br /&gt;
&lt;br /&gt;
Owen has over 7 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland.&lt;br /&gt;
&lt;br /&gt;
Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
&lt;br /&gt;
Owen has also performed numerous web application, network, mobile, specialised technologies (ATM), device penetration tests for major organisations in the financial services, banking and pharmaceutical sectors, consisting of ‘black-box’, ‘white-box’ and ‘grey-box’ testing.  &lt;br /&gt;
&lt;br /&gt;
'''References'''&lt;br /&gt;
&lt;br /&gt;
'''John Doherty Msc Security &amp;amp; Forensic Computing'''&lt;br /&gt;
&lt;br /&gt;
Owen was my lecturer for Security in NCI. His class and teaching made me seek a further interest in the cyber security field. Even after college I kept in touch with him and he gave me advice and encouraged me to do a masters in security in DCU. &lt;br /&gt;
&lt;br /&gt;
Since then Owen pointed me to the OWASP mailing list which keeps me updated on chapter meetings which I regularly attend and also cyber security job postings and courses. The speakers that have attended have been very interesting and informative. &lt;br /&gt;
&lt;br /&gt;
Owen is now advising/helping me with my DCU masters practicum.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''‪Mark Denihan OWASP Security Shepherd Project Lead'''&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''Fabio Cerullo Managing Director at Cycubix'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
‪'''Jason flood CTO of Security Gamification at IBM'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=220031</id>
		<title>User:Owen Pendlebury</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=220031"/>
				<updated>2016-08-05T14:41:39Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OwenPendlebury.jpg|left|]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Owen graduated in 2009 from Dundalk Institute of Technology, with a degree in Computer Applications and Support and an honours degree in IT Management specialising in web application development and networking. In 2009, Owen completed an MSc in Security &amp;amp; Forensic Computing from Dublin City University.&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 7 years. Some of the projects that Owen has been involved in include, AppSec EU 2016/2017 Committee/ Training Committee , AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars, Cyber Security Summer Camp for school kids  and numerous security workshops.&lt;br /&gt;
&lt;br /&gt;
Owen has over 7 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland.&lt;br /&gt;
&lt;br /&gt;
Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
&lt;br /&gt;
Owen has also performed numerous web application, network, mobile, specialised technologies (ATM), device penetration tests for major organisations in the financial services, banking and pharmaceutical sectors, consisting of ‘black-box’, ‘white-box’ and ‘grey-box’ testing.  &lt;br /&gt;
&lt;br /&gt;
'''John Doherty Msc Security &amp;amp; Forensic Computing'''&lt;br /&gt;
&lt;br /&gt;
Owen was my lecturer for Security in NCI. His class and teaching made me seek a further interest in the cyber security field. Even after college I kept in touch with him and he gave me advice and encouraged me to do a masters in security in DCU. &lt;br /&gt;
&lt;br /&gt;
Since then Owen pointed me to the OWASP mailing list which keeps me updated on chapter meetings which I regularly attend and also cyber security job postings and courses. The speakers that have attended have been very interesting and informative. &lt;br /&gt;
&lt;br /&gt;
Owen is now advising/helping me with my DCU masters practicum.&lt;br /&gt;
&lt;br /&gt;
'''‪Mark Denihan OWASP Security Shepherd Project Lead'''&lt;br /&gt;
&lt;br /&gt;
Owen is the model chapter lead, who has been extremely active and dedicated in the Dublin Space. His enthusiasm and perseverance for OWASP is inspiring. He has made significant impacts on the Information Security community through the regular activities for the OWASP Dublin chapter he has organised and the contributions he's made to other security entities (Daggercon 2015).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''Fabio Cerullo Managing Director at Cycubix'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
‪'''Jason flood CTO of Security Gamification at IBM'''&lt;br /&gt;
&lt;br /&gt;
‪Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2016&amp;diff=220001</id>
		<title>WASPY Awards 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2016&amp;diff=220001"/>
				<updated>2016-08-03T14:02:23Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: Updated profile link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY 2016 Banner.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;font size=&amp;quot;6&amp;quot;&amp;gt;'''Web Application Security People of the Year Awards 2016'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Timeline'''==&lt;br /&gt;
June 7, 2016 - Call for Nominees Opens! CLOSED&amp;lt;br&amp;gt;&lt;br /&gt;
June 20, 2016 - [https://www.owasp.org/index.php/2016_Membership_Drive_April_1_-_June_20 Paid Membership] Deadline. Not sure if you are a member? [https://docs.google.com/spreadsheets/d/1iabh7RrMMRQce0cDQsv_GdQtSKz4G9ISan9svfn_6kE/edit?usp=sharing Check Here ]&amp;lt;br&amp;gt;&lt;br /&gt;
July 28, 2016 - Call for Nominees CLOSED&amp;lt;br&amp;gt;&lt;br /&gt;
July 29, 2016 - Announcement of Nominees per Category to the Community&amp;lt;br&amp;gt;&lt;br /&gt;
August 5, 2016 - Deadline for Nominee Profile Picture and Bio to be created and added to the nominees Citation&amp;lt;br&amp;gt;&lt;br /&gt;
August 10, 2016 - Voting Opens&amp;lt;br&amp;gt;&lt;br /&gt;
August 24, 2016 - Voting Closes&amp;lt;br&amp;gt;&lt;br /&gt;
August 25, 2016 - Winners are Notified&amp;lt;br&amp;gt;&lt;br /&gt;
August 25, 2016 - Announcement of Winners to the Community&amp;lt;br&amp;gt;&lt;br /&gt;
October 13/14, 2016 - Award Ceremony at AppSecUSA 2016 in Washington, DC&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Purpose of the Awards'''==&lt;br /&gt;
Each year there are many individuals who do amazing work, dedicating countless hours to share, improve, and strengthen the OWASP mission.  Some of these individuals are well known to the community while others are not.  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''The purpose of these awards is to bring recognition to those who &amp;quot;FLY UNDER THE RADAR&amp;quot;.  These are the individuals who are passionate about OWASP, who contribute hours of their own free time to the organization to help improve the cyber-security world, yet seem to go unrecognized.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Community members are able to nominate 1 individual per category (see Categories below) who they feel best fits these descriptions so that, as a community, we can recognize these people for their contributions. We are tying in the WASPY Awards to help identify and recognize individuals who demonstrate our core values and annual report theme of ''Leading - Learning - Sharing - Growing''.  We value your input and consideration for nominations in the categories below.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Categories'''==&lt;br /&gt;
1. '''Open/Leading''' - Everything at OWASP is radically transparent – from our finances to our code.  This award goes to a member of the OWASP community who has supported the OWASP mission of transparency through their influence, management, and leadership in the community.  This might be a chapter or project leader or may be someone who has worked within the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. '''Integrity/Learning''' - OWASP is an honest and truthful, vendor neutral, global community.  This award goes to an individual who recognizes the benefits of the power of the collective community within OWASP, who challenges the status quo, and generates an excitement in the learning community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. '''Innovation/Sharing''' - OWASP encourages and supports innovation and experiments for solutions to software security challenges.  This award goes to an individual who has inspired and encouraged others in the arena of software security with innovative and cutting edge solutions to software security challenges.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4. '''Global/Growing''' - Around the world, OWASP encourages and supports innovation and experiments for solutions to software security challenges.  This award goes to an individual who truly represents the OWASP Global scope and recognizes the importance of growth.  The nominee reaches out beyond the OWASP circle to raise awareness of software security in locations outside of the OWASP comfort zone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Category &amp;amp; Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Tony Clarke||align=&amp;quot;center&amp;quot;|'''Open/Leading Category'''&amp;lt;br&amp;gt; Tony has been nominated 2 times for this category.&amp;lt;br&amp;gt; '''Citation 1'''Tony has recently volunteered in the Dublin (Ireland) chapter and more recently been voted in as chapter leader. From his initial efforts, Tony has completely transformed this stagnant chapter and has already in just a few months re-organised the chapter and opened it up to the many volunteers who want to be involved. Running initiatives such as 'Women in Appsec', Tony has helped increase meeting attendances and the Dublin board now consists of nearly 20 individuals. Tony has embraced the open, transparency and inclusiveness side of owasp and is an inspiration to many.&amp;lt;br&amp;gt; &lt;br /&gt;
'''Citation 2''' I would like to Nominate Tony Clarke for this award. He has been on the OWASP board in Dublin since November 2015 and there have been massive changes within the chapter since then. Tony has transformed the Dublin Chapter and has been recently elected as Dublin Chapter Lead with a landslide victory.I have been attending OWASP events since 2012 and over the past 8 months it is visible of the impact Tony and OWASP are having within the local Dublin security security community.Previously, events were sporadic and occurred every few months. There was never an organised schedule of events. Communication of the events were also poor. With Tony on board, this has changed. Events are now at the end of each month and are organised on a scheduled basis. Communication has improved and with extra social media interaction, OWASP events are now more visible than before.At the end of May the Chapter hosted an event focusing on Women In Security. Keynote speakers such as Jane Frankland, Jacky Fox, local women involved in the security community presented at the event.Everyone left the event feeling motivated. My partner who is a science graduate attended the event with me. She left the event wanting to work in Security and has since begun the enrollment into a Security Conversion Masters in UCD. This is the sort of impact which Tony's work is having on the people of Dublin.The OWASP Dublin chapter previously had 40-50 people MAX at events. It was the same people always. There were 200+ people in attendance at the Women In Security event in May. This sort of attendee never been seen before at a local chapter meeting in Dublin.I believe that this attendance peaked because of Tony's drive to engage the security community in Dublin. Tony organised contacts in universities and large multinational organisations to send email communication to Dublin staff'students. His aim to get more women studying technology or working in technology companies engaging with the security community in Dublin. Tony is leaving no stone un-turned to make OWASP Dublin to success within the community.As a committee member of OWASP Dublin I know that Tony is now reaching out to work with local education bodies such as Smart futures (Science Foundation Ireland) Dublin Institute of Technology, ISACA and Science Gallery. He has brought a plan to our chapter and given us a goal this year to collaborate with education bodies to try sell our security industry to people in education. This is not limited to 3rd level, but also primary and secondary. Tony is leading this initiative and it would not happen without him.I found out about these awards as Tony is trying to improve the open-ness of the Dublin chapter. He is encouraging the community to post this sort of communications to the social media platforms such as facebook, twitter, linked-in.Based on above, Tony has demonstrated that he is not in this for the title or limelight but for the good of the community. He is a leader who is willing to listen and wants to delegate if any OWASP committee member are willing to take on a task. Like any good leader, if he does not have anyone available to do a task, he does it himself.OWASP Dublin Chapter has only been under the leadership of Tony Clarke for two months. We have been enjoying success since Tony first attended a board meeting in 2015. Tony is having major impact within Dublin. I encourage you to strongly consider Tony for this award as he has done great things for us here in Dublin and his leadership is going from strength to strength. &lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Jeremy Long||align=&amp;quot;center&amp;quot;|'''Open/Leading Category'''  Jeremy wrote a tool, donated it to OWASP and in 2016 it because on of the OWASP Flagship projects. He is not noisy or gets a lot of attention, but every morning before work - Jeremy works on the OWASP Dependency Check. Dependency-Check is a utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities. Currently Java and .NET are supported; additional experimental support has been added for Ruby, Node.js, Python, and limited support for C/C++ build systems (autoconf and cmake). The tool can be part of a solution to the OWASP Top 10 2013 A9 - Using Components with Known Vulnerabilities.  &lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/John_Patrick_Lita John Patrick Lita]||align=&amp;quot;center&amp;quot;|'''Open/Leading Category'''  An outstanding volunteer doing an amazing job in the Asia region to promote OWASP projects and materials, reaching a big audience through his outreach program on universities, government institutions and schools on the Philippines. OWASP is not very well know in this part of the Globe and by promoting it, he is creating awareness about application security&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Owen_Pendlebury Owen Pendlebury]||align=&amp;quot;center&amp;quot;|'''Open/Leading Category''' Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 6.5 years. Some of the projects that Owen has been involved in include, AppSec EU 2016 Committee/ Training Committee, AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars and numerous security workshops.Owen has over 6.5 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland. Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Kathy Thaxton||align=&amp;quot;center&amp;quot;|'''Open/Leading Category''' Kathy Thaxton has been THE key leader for SnowFROC for many years. As with most regional conferences, everyone involved has a day job and nobody's got a lot of spare time to do what must be done.&lt;br /&gt;
Kathy has somehow found time whenever she's been asked, and has done the lion's share of the work required to organize SnowFROC.&lt;br /&gt;
For SnowFROC 2016 we had the usual chaotic first planning meeting where several of us gathered at a pub to see which of us would be able to commit time &amp;amp; to identify potential roles. Everybody left that meeting with action-items. Shortly thereafter, Kathy emailed the rest of us to inform us that she had: drafted a budget,drafted a planning schedule,identified primary &amp;amp; alternate venues,identified primary &amp;amp; competing caterers,reached out to some legendary speakers &amp;amp; gotten tentative commitments,reached out to several vendors &amp;amp; gotten tentative sponsorship commitments, and,identified a good source of volunteers for setup, event day, and tear-down. In other words, Kathy Thaxton had done most of the &amp;quot;heavy lifting&amp;quot; within days of the initial planning meeting! Like previous SnowFROC's, SnowFROC 2016 was attended by Coloradans for the most part, but as with most years we had attendees from Arizona, Utah, Wyoming, and New York. SnowFROC had about 200 attendees, with a mix of ITSec operators, QA/testers, Developers, Auditors, &amp;amp; Managers for all of the above. None of this would have happened without Kathy Thaxton's involvement. Her tact, initiative, cheerfulness, and exceptional organizational skills allowed the rest of the planning committee to focus on things like establishing the curriculum, including a day-long hands-on workshop. Kathy's contribution was so profound and her reputation for organizing a FUN, well-planned, LEARNING event is so great that the local Cloud Security Alliance went out of their way to request her participation on their planning committee for a regional event they're hosting later this year. I attended yesterday's Cloud Security Alliance meeting, and whereas AppSec in the Cloud has been an afterthought at most CSA meetings, it was front-and-center yesterday as the Chapter Leaders asked their members what tracks/topics they'd be most interested in for their upcoming event. That is DEFINITELY reach OUTSIDE of the OWASP community, and again would not have happened without Kathy's stellar achievements at SnowFROCs.&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[http://owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]||align=&amp;quot;center&amp;quot;|'''Open/Leading Category''' Core Team Member in [https://www.owasp.org/index.php/Category:India AppSec India 2016]&lt;br /&gt;
* The [http://owasp.org/index.php/Mumbai_Student_Chapter Mumbai Student Chapter] Leader making student endorse in Information Security and Spreading Idea and Awareness via Chapter Meets.&lt;br /&gt;
* Helping and Speaking Initiatives in [https://www.owasp.org/index.php/Mumbai OWASP Local Chapter Meet Mumbai] with chapter leader Narenda Choyal.&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Tom Brennan Honorable Mention||align=&amp;quot;center&amp;quot;|Tom was nominated for the '''Open/Leading Category'''. Per the WASPY Award rules, board members are not eligible. Tom is a current board member and therefore he is not eligible for the award.&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[http://owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]||align=&amp;quot;center&amp;quot;|'''Integrity/Learning Category''' [https://www.owasp.org/index.php/OWASP_Trainers_Database Call_For_Trainers] in OWASP Mumbai, India , being in Trainers DB , Dhiraj have taken ton's of free Session's to Mumbai Cop's , Navi Mumbai Cyber Cell , Thane Cyber Cell and many other's. &lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/John_Patrick_Lita John Patrick Lita]||align=&amp;quot;center&amp;quot;|'''Open/Leading Categor'''y  An outstanding volunteer doing an amazing job in the Asia region to promote OWASP projects and materials, reaching a big audience through his outreach program on universities, government institutions and schools on the Philippines. OWASP is not very well know in this part of the Globe and by promoting it, he is creating awareness about application security&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Steve Kosten||align=&amp;quot;center&amp;quot;|'''Integrity/Learning Category'''  Steve Kosten is the Denver Chapter Leader. For the past year, Steve has built community and fostered AppSec learning within Colorado. Before Steve joined the Denver OWASP Board, the Chapter was averaging 2 meetings per year attended by about 15 people. After 1 year on the board there had been 6 meetings with a high-water mark of 50 attendees. Since Steve has become Chapter Leader, attendance is &amp;gt;75 for the 4+ meetings each year. This is directly attributable to Steve's selection of top-quality speakers and an exceptional partnership with a local vendor who provides venue &amp;amp; catering, all in exchange for a simple &amp;quot;thank you&amp;quot; and round of applause. As a SANS AppSec Instructor, Steve is an AppSec expert who has cheerfully shared his expertise with attendees. Steve is a selfless leader who has profoundly improved the Denver OWASP Chapter and become a highly sought-after resource in this community.&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Eoin Keary||align=&amp;quot;center&amp;quot;|'''Integrity/Learning Category'''  Eoin gives up his free time to run free security training sessions within the community in Dublin. He is dedicated to spreading the OWASP message within Dublin. He is working within the community for the good of OWASP . Eoin is a committee member and does not have any &amp;quot;board&amp;quot; level title. He is giving to the community and is demonstrating that he does not expect anything in return. Eoin is a role model within our Dublin Chapter&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Owen_Pendlebury Owen Pendlebury]||align=&amp;quot;center&amp;quot;|'''Integrity/Learning Category'''  Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 6.5 years. Some of the projects that Owen has been involved in include, AppSec EU 2016 Committee/ Training Committee, AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars and numerous security workshops. Owen has over 6.5 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland. Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]||align=&amp;quot;center&amp;quot;|'''Innovation/Sharing Category'''  Past Contributor in [http://owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet The Popular XSS Filter Evasion Cheat Sheet] where as ,This article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing.&lt;br /&gt;
* Lead of [https://www.owasp.org/index.php/SQL_Injection_Bypassing_WAF SQLi WAF Bypass] a very helpful cheat sheet which consists of A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete),recommended by many Security Researcher's. &lt;br /&gt;
*Contributor in [https://www.owasp.org/index.php/Benchmark OWASP Benchmark],contributed SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring. Many Thanks to [https://www.owasp.org/index.php/Benchmark#tab=Acknowledgements '''Dave Wichers''']&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/John_Patrick_Lita John Patrick Lita]||align=&amp;quot;center&amp;quot;|'''Open/Leading Category'''  An outstanding volunteer doing an amazing job in the Asia region to promote OWASP projects and materials, reaching a big audience through his outreach program on universities, government institutions and schools on the Philippines. OWASP is not very well know in this part of the Globe and by promoting it, he is creating awareness about application security&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Mark Major||align=&amp;quot;center&amp;quot;|'''Innovation/Sharing Category'''  Mark Major did a LOT of HARD work to ensure that AppSecUSA was a success in Denver. He has consulted with his Chapter and worked with OWASP to try to take the Chapter to the next level. Specifically, his research into using some of the proceeds from his efforts at AppSecUSA to establish an AppSec HackerSpace is both innovative and well overdue.&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Owen_Pendlebury Owen Pendlebury]||align=&amp;quot;center&amp;quot;|'''Innovation/Sharing Category'''  Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 6.5 years. Some of the projects that Owen has been involved in include, AppSec EU 2016 Committee/ Training Committee, AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars and numerous security workshops.Owen has over 6.5 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland. Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[http://owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra]||align=&amp;quot;center&amp;quot;|'''Global/Growing Category'''  * [https://www.owasp.org/index.php/About_OWASP/Bug_Bounty/WOF '''OWASP Wall Of Fame''']&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/John_Patrick_Lita John Patrick Lita]||align=&amp;quot;center&amp;quot;|'''Global/Growing Category'''  An outstanding volunteer doing an amazing job in the Asia region to promote OWASP projects and materials, reaching a big audience through his outreach program on universities, government institutions and schools on the Philippines. OWASP is not very well know in this part of the Globe and by promoting it, he is creating awareness about application security&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|Kathy Thazton||align=&amp;quot;center&amp;quot;|'''Global/Growing Category''' Kathy Thaxton has been THE key leader for SnowFROC for many years. As with most regional conferences, everyone involved has a day job and nobody's got a lot of spare time to do what must be done.&lt;br /&gt;
Kathy has somehow found time whenever she's been asked, and has done the lion's share of the work required to organize SnowFROC.&lt;br /&gt;
For SnowFROC 2016 we had the usual chaotic first planning meeting where several of us gathered at a pub to see which of us would be able to commit time &amp;amp; to identify potential roles.Everybody left that meeting with action-items.Shortly thereafter, Kathy emailed the rest of us to inform us that she had: drafted a budget,drafted a planning schedule,identified primary &amp;amp; alternate venues,identified primary &amp;amp; competing caterers,reached out to some legendary speakers &amp;amp; gotten tentative commitments,reached out to several vendors &amp;amp; gotten tentative sponsorship commitments, and,identified a good source of volunteers for setup, event day, and tear-down.In other words, Kathy Thaxton had done most of the &amp;quot;heavy lifting&amp;quot; within days of the initial planning meeting!Like previous SnowFROC's, SnowFROC 2016 was attended by Coloradans for the most part, but as with most years we had attendees from Arizona, Utah, Wyoming, and New York.SnowFROC had about 200 attendees, with a mix of ITSec operators, QA/testers, Developers, Auditors, &amp;amp; Managers for all of the above.None of this would have happened without Kathy Thaxton's involvement. Her tact, initiative, cheerfulness, and exceptional organizational skills allowed the rest of the planning committee to focus on things like establishing the curriculum, including a day-long hands-on workshop.Kathy's contribution was so profound and her reputation for organizing a FUN, well-planned, LEARNING event is so great that the local Cloud Security Alliance went out of their way to request her participation on their planning committee for a regional event they're hosting later this year.I attended yesterday's Cloud Security Alliance meeting, and whereas AppSec in the Cloud has been an afterthought at most CSA meetings, it was front-and-center yesterday as the Chapter Leaders asked their members what tracks/topics they'd be most interested in for their upcoming event.That is DEFINITELY reach OUTSIDE of the OWASP community, and again would not have happened without Kathy's stellar achievements at SnowFROCs.&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;centre&amp;quot;|[https://www.owasp.org/index.php/User:Owen_Pendlebury Owen Pendlebury]||align=&amp;quot;center&amp;quot;|'''Global/Growing Category''' Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 6.5 years. Some of the projects that Owen has been involved in include, AppSec EU 2016 Committee/ Training Committee, AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars and numerous security workshops. Owen has over 6.5 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland.Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''Rules'''==&lt;br /&gt;
'''Remember the purpose of these awards is to recognize the UNSUNG HEROS out there, that are barely recognized for their contributions to the OWASP Foundation.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1. [https://www.owasp.org/index.php/About_OWASP#2015_Global_Board_Members Board members] may not be nominated&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. [https://www.owasp.org/index.php/About_OWASP#Employees_and_Contractors_of_the_OWASP_Foundation Employees &amp;amp; Contractors] may not be nominated&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. You MUST be a [https://www.owasp.org/index.php/2016_Membership_Drive_April_1_-_June_20 Paid or Honorary member] to vote and your [https://docs.google.com/spreadsheets/d/1iabh7RrMMRQce0cDQsv_GdQtSKz4G9ISan9svfn_6kE/edit#gid=1961079767 membership] needs to be on file by June 20, 2016&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4. All nominees will remain anonymous until July 11, 2016&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
5. Anyone can nominate an &amp;quot;unsung hero&amp;quot; who has contributed in some way to OWASP who they feel best fits each category&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
6. You may only nominate one person per category&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Eligible Voters'''==&lt;br /&gt;
Individuals who were members as of June 20, 2016 are eligible and are listed [https://docs.google.com/spreadsheets/d/1iabh7RrMMRQce0cDQsv_GdQtSKz4G9ISan9svfn_6kE/edit#gid=1961079767 here]. Please take a minute to verify your name is on the list.  If you are '''NOT''' on the list and believe you should be, then you should '''[https://www.tfaforms.com/308703 contact us immediately]'''&lt;br /&gt;
&lt;br /&gt;
=='''Sponsorship Opportunities'''==&lt;br /&gt;
Coming Soon!&lt;br /&gt;
&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!&lt;br /&gt;
&lt;br /&gt;
=='''Communication'''==&lt;br /&gt;
June 7, 2016 [https://twitter.com/owasp/status/740236956550959104 Twitter], [https://www.facebook.com/groups/owaspfoundation/permalink/1004714156315924/ Facebook], [https://www.linkedin.com/groups/36874/36874-6146003139049906179 LinkedIn], [https://plus.google.com/116933056486234813396/posts/7AktQkr9y5c Google+], [http://owasp.blogspot.com/2016/06/2016-waspy-awards.html OWASP Blog].&lt;br /&gt;
&lt;br /&gt;
=='''Past WASPY Awards'''==&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2015 2015]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2014 2014] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2013 2013] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2012 2012]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=220000</id>
		<title>User:Owen Pendlebury</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Owen_Pendlebury&amp;diff=220000"/>
				<updated>2016-08-03T13:57:20Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: Update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OwenPendlebury.jpg|left|]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Owen graduated in 2009 from Dundalk Institute of Technology, with a degree in Computer Applications and Support and an honours degree in IT Management specialising in web application development and networking. In 2009, Owen completed an MSc in Security &amp;amp; Forensic Computing from Dublin City University.&lt;br /&gt;
&lt;br /&gt;
Owen has been involved in the OWASP Foundation since 2009. He started out attending OWASP Dublin meetings and helping to facilitate chapter meetings and security workshops. Eventually, he took on the role of Dublin board member and then chapter lead a couple of years later. He has been an extremely active member of the security community and has strived to help drive and improve security best practice at a Global level through his commitment to the OWASP foundation. Owen has been an active and dedicated chapter leader, who has organised regular activities for the OWASP Dublin chapter that benefit the local information security community greatly over the past 7 years. Some of the projects that Owen has been involved in include, AppSec EU 2016/2017 Committee/ Training Committee , AppSec EU 2017 successful bid, DaggerCon, Cyber Startup Summit, Source Dublin, Advanced Threat Intelligence Seminars, Cyber Security Summer Camp for school kids  and numerous security workshops.&lt;br /&gt;
&lt;br /&gt;
Owen has over 7 years’ penetration testing, working as part of a global attack &amp;amp; penetration team for a number organisations including a “Big 4” professional services company. With in-depth experience of application and network penetration testing Owen has worked with many local and global institutions to improve their security posture. Owen is currently a manager in Deloitte Ireland.&lt;br /&gt;
&lt;br /&gt;
Owen has also been involved in local education bodies, architecting a masters in cyber security and helping a number of students and experienced individuals find their way in to the security community by making himself available to through all media.&lt;br /&gt;
&lt;br /&gt;
Owen has also performed numerous web application, network, mobile, specialised technologies (ATM), device penetration tests for major organisations in the financial services, banking and pharmaceutical sectors, consisting of ‘black-box’, ‘white-box’ and ‘grey-box’ testing.  &lt;br /&gt;
&lt;br /&gt;
'''Citation 1'''&lt;br /&gt;
&lt;br /&gt;
Owen was my lecturer for Security in NCI. His class and teaching made me seek a further interest in the cyber security field. Even after college I kept in touch with him and he gave me advice and encouraged me to do a masters in security in DCU. &lt;br /&gt;
&lt;br /&gt;
Since then Owen pointed me to the OWASP mailing list which keeps me updated on chapter meetings which I regularly attend and also cyber security job postings and courses. The speakers that have attended have been very interesting and informative. &lt;br /&gt;
&lt;br /&gt;
Owen is now advising/helping me with my DCU masters practicum.&lt;br /&gt;
&lt;br /&gt;
'''Citation 2'''&lt;br /&gt;
&lt;br /&gt;
Owen is an active and dedicated chapter leader, who organises regular activities for the OWASP Dublin chapter and that benefit greatly the local information security community.&lt;br /&gt;
&lt;br /&gt;
'''Citation 3'''&lt;br /&gt;
&lt;br /&gt;
Owen is a fantastic example of a dedicated security professional. I have worked with Owen for more than 5 years across various projects. He is a very active member of the security community and helps to drive and improve security best practice at a Global level through his commitment to the OWASP group. Owen is an asset that helps to improve Ireland's security capabilities with a real can-do attitude.&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OwenPendlebury.jpg&amp;diff=219998</id>
		<title>File:OwenPendlebury.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OwenPendlebury.jpg&amp;diff=219998"/>
				<updated>2016-08-03T13:37:33Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dublin&amp;diff=212926</id>
		<title>Dublin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dublin&amp;diff=212926"/>
				<updated>2016-04-11T20:26:38Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ireland|extra= [[File:Owasp_logo_ireland_small.jpg]]| mailinglistsite=https://lists.owasp.org/mailman/listinfo/owasp-ireland}} become a [http://www.owasp.org/index.php/Membership#Categories_of_Membership_.26_Supporters Member or Annual Chapter Sponsor(s)]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact ANY of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:Owen.Pendlebury(at)owasp.org mail[[User:Owen Pendlebury|Owen Pendlebury]]] +353876605277&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Mark.Denihan(at)owasp.org Mark Denihan]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/ Global Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Tony.Clarke(at)owasp.org Tony Clarke]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP Ireland'''&amp;lt;br&amp;gt;40 Block E, Smithfield Market Smithfield &amp;lt;br&amp;gt; Dublin 7, Ireland &amp;lt;br&amp;gt;Tel: +353876605277 &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== OWASP Dublin Chapter 2016 ==&lt;br /&gt;
=== OWASP April Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – '''OWASP April Event - DevOps''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 27th April&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Talks Start: 18:30pm &amp;lt;br&amp;gt; Event finishes at 21:30pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration [https://www.eventbrite.com/e/owasp-april-event-devops-tickets-24574522057register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hi Everyone,&lt;br /&gt;
&lt;br /&gt;
We're happy to announce that we will be hosting our next OWASP Dublin chapter event in the Morgan McKinley’s office on Wednesday April 27th 2016 at 6:30pm and will be focused on DevOps. Please feel free to forward the event to friends and colleagues. &lt;br /&gt;
&lt;br /&gt;
We're hoping to have some gifts to give away as part of the night. &amp;lt;BR&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Thanks to Morgan McKinley for sponsoring the event.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Session 1 - John Turner - Monkey Little'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
John Turner has been developing software in the financial and betting industry since 1999. He has a huge interest in the changing ways in which software projects are being delivered. This has led John to discover, learn and apply the practices and principles fundamental to Agile software development particularly those of Scrum and Lean. More recently John spends his time identifying how best to leverage the emergence of Cloud (IAAS, PAAS, SAAS) to create more Agile businesses. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
John's session will focus on &amp;quot;DevOps Adoption Patterns&amp;quot;. While DevOps is still riding high on a peak of inflated expectations, a number of patterns of adoption are starting to emerge. The conceptual definition of Agile made it difficult to embrace until frameworks such as Scrum became popular. In this same way, the theoretical and visionary definition of DevOps is creating a barrier to entry for those eager to realise its benefits. Fear not, for there are brave soles who have gone before us that we can strive to emulate!  Join us to talk about some of the ways in which people are 'doing DevOps’. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Session 2 - Noel King - VSWare '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Noel is VP for Engineering at VSWare an Irish Software company which provides a cloud based administration system to the education sector.  He has led and developed software solutions across multiple sectors and is focused on driving excellence through team orientated development utilising the best industry standards. He has a passion for quality assurance, development automation, continuous delivery and leveraging cloud to get your product to market quicker. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
He spends his free time volunteering with CoderDojo, mentoring the technology innovators of the future, building cool and fun course material and promoting the ideology.  Passionate about education and inspiring the next generation he created CoderDojo Coolest Projects Awards.  The Coolest Projects is now Ireland's largest tech event that focuses on creativity takes place annually in Dublin and Silicon Valley. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Noel's session is entitled &amp;quot;Banishing Snakes from Green Field Development&amp;quot;. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Session 3 - Ryan Sudding - VMware'''&lt;br /&gt;
&lt;br /&gt;
Ryan works for VMware as a Systems Engineer. He has spent the last number of years working as an Infrastructure Consultant, but more recently has spent more time working with the VMware Network and Security Business Unit. He loves cars, travel and spending time with his wife and 11 month old daughter. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ryan's session will be primarily focused on the current security landscape and also will also try debunk a few security myths. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org''' or Tony Clarke on '''tony.clarke(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP March Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Session 1 – Data Protection / Session 2 - Working in IT Security Panel  ''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 31st March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-march-event-session-1-general-data-protection-regulation-gdpr-session-2-working-in-it-tickets-23939161677register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Thanks to Morgan McKinley for sponsoring the event&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
'''Session 1 – Hugh Jones - General Data Protection Regulation (GDPR) ''' [[File:OWASP_INtro_to_GDPR_1603.ppt]]&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
With the current EU legislation passing its 20th year back in October, it is high time that the EU Data Protection regime caught up with everything that is happening in the commercial, technological and social media sectors. The EU Commission has recently published the final draft of the new General Data Protection Regulation (GDPR), scheduled to take effect across the EU in early 2018. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
For organisations who already have a culture of DP compliance in place, the new Regulation will introduce a few changes, but nothing particularly challenging. For those who have ignored or failed to step up to the 1995 Directive, the next two years could be a very busy time indeed! &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
This overview of the Regulation provides an understanding of the key concepts contained in the new legislation, the main areas of change, and some good advice on the steps which organisations need to take in order to prepare in a timely and organised manner.&lt;br /&gt;
The key motto being: “Don’t Panic!”” &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''Session 2 – Working in IT Security'''&lt;br /&gt;
 &lt;br /&gt;
A panel of experts will discuss what it is like to work in IT Security industry in Ireland. The aim is of this session is to give the audience an overview of the different types of roles and opportunities in IT Security and afford the audience an opportunity to ask questions in relation to any aspect of IT Security. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''1. Jason Flood– CTO IBM'''&amp;lt;BR&amp;gt; &lt;br /&gt;
 &lt;br /&gt;
Jason Flood is currently completing his Phd at the Institute of Technology in Blanchardstown. He is also heavily involved in the Security Research Lab, located in the Learning &amp;amp; Innovation Centre in ITB. His main research area is in the field of cyber-security and risk analysis. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Jason is founder of the Irish honeynet project and contributor to OWASP. He is also a board member of InfoSecurity Ireland. Jason is the CTO in IBM in the security space. Jason has helped deliver numerous Capture-the-Flag events at both a local, national and international level over the last 5 years for events such as Appsec, Source and IRISS. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''2. Dara Boland – Morgan McKinley'''&amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Dara Boland heads up Morgan McKinley’s Information Security Recruitment team. He is a connector, blogger and market leader who is constantly helping companies locate and hire the right people, across the whole spectrum of Information Security. Dara has an extensive network and reputation in Ireland and across Europe. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''3. Hugh Callaghan – Executive Director EY '''&amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Hugh is the Executive Director in our EMEIA Financial Services Advisory team with responsibility for leading our rapidly growing Advanced Security Centre, which is EY’s market-leading capability hub for delivering cyber security services to large domestic and multinational clients. Hugh has previous experience of large-scale technical security testing programmes, online banking fraud strategy, business-driven security architecture, cyber security roadmap definition and improvement programme delivery. Hugh currently has a significant focus on helping both boards and top executive management understand the implications of the cyber security threat environment in the context of their businesses, consistent with EY’s mission of making the digital world a safer place to do business. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Hugh is a research scientist by background, with a Ph.D. in computational physics from University College Cork and the Max Planck Institute, Germany. Hugh joined EY in 2003 from an international electronic payments company. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''4. Rahim Jina – Director BCC Risk Advisory'''&amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Rahim is a director in BCC Risk Advisory and parent company of edgescan™, based in Ireland. Prior to this, Rahim was Head of Security for Fonality, a VOIP provider based in Los Angeles and was also a senior security consultant for a ‘Big 4’ consultancy firm for many years. Rahim has a degree in Computer Science from Trinity College Dublin and an MSc in Security &amp;amp; Forensic Computing from Dublin City University. Rahim has been an OWASP contributor and volunteer since 2007.  &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''5. Declan Timmons – Principal Security Consultant Ward Solutions ''' &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Declan is Ward Solutions Principal Security Consultants in Forensics and e-Discovery operating at both the consultative and practitioner level.  Originally a member of the defence forces in Ireland, Declan has a 1st class honours masters in cybercrime and forensics investigations, as well as a Certified Encase Forensics Examiner (EnCE), Certified Information Security Manager (CISM), and ISO-27001 Lead Auditor. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''6. Leonard McAuliffe – Director - Cyber Security and Forensics at PwC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Leonard leads the Cyber Security and Forensics practice for PwC Ireland. Leonard has worked in the area of Cyber Security and Forensics for over 17 years and had delivered Cyber Security and Forensics services to many top international and national clients in many sectors. Some of Leonard’s Cyber Security areas of expertise include Cyber Strategy and Operating Models, Governance &amp;amp; Program Management,Cyber Security Architecture, Cyber Security Standards, Data Protection and Privacy, Identity and Access Management, Vulnerability Management, Ethical Hacking, Application Security, Cloud Security, Mobile Device Management, infrastructure and operational security reviews.&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org''' or Tony Clarke on '''tony.clarke(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP February 2016 Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Gavin O’Gorman and Alain Abou Tass ''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 25th February&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration  [https://www.eventbrite.com/e/owasp-february-event-gavin-ogorman-and-alain-abou-tass-tickets-21790679509 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
We are delighted to to welcome Gavin O’Gorman and Alain Abou Tass for our latest OWASP Dublin Chapter meeting. Registration will start from 6:30pm 25th February with talks beginning at 7:00pm.&lt;br /&gt;
&lt;br /&gt;
There will be beer and Pizza generously provided by Morgan McKinley&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gavin O’Gorman– Symantec - '''  &lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Working in Symantec for the past six years, Gavin is an intelligence analyst on the attack investigations team. Before moving to the attack investigations team in 2013, he worked as a reverse engineer, and later as an incident handler. Gavin’s primary role is to gather together information from both Symantec data sources, and open sources, in order to build a comprehensive picture of an attack, or attackers. Another aspect of the job is to work with law enforcement to assist in the investigation of e-crime where possible. Prior to working in Symantec, Gavin spent several years researching network security in Dublin City University, and currently lectures part-time for the Masters in Security &amp;amp; Forensics course. &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''' Alain Abou Tass – Ward Solutions - Web applications on the battlefield''' [[File:Battle20160225-V1.0.0.pptx]]&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Penetration testers spend most of their time identifying security holes. Sometimes if we’re lucky enough, we hit the jackpot. In this talk, I will be detailing some instances of real life attacks on web applications. I’ll show how one small vulnerability, in conjunction with others, can be lethal and lead to a big breach. This will highlight the importance of fixing the small issues that are usually neglected. Also, I’ll show some interesting tricks that can be used to exploit existing vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2015 ==&lt;br /&gt;
=== OWASP December Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Tony Clarke and William Bailey ''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 10th December&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration  [https://www.eventbrite.com/e/owasp-december-event-christmas-party-tony-clarke-will-bailey-tickets-19873992647 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | The event will be followed by our annual Christmas party in a location to be decided. I would like to thank our sponsors Ward Solutions, Integrity 360,BH Consulting, Edgescan and Morgan McKinley. There will be a raffle during the event for a Samsung Galaxy Tab. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tony Clarke – ICON PLC - Application security in a cyber security program'''  [[File:OWASP-v1.0.pptx]]&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Data breaches such as the recent Talk Talk and Vtech breaches are regularly reported on in the media and its clear that existing approaches to application security are flawed and failing. This session will examine application security in the context of a cyber security program and will outline an approach to application security which facilitates modern development practices and standards. The session will examine security models, controls, processes and metrics which are required to prevent, detect and respond to these types of breach and integrate with operational models and compliance requirements.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Will Bailey – IBM - Drop your breaches'''  [[File:OWASP_will_20151210.pptx]]&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
In this talk, I'll cover how we could be doing a much better job of improving the security of applications by educating developers better and why the approach a lot of the current security education employs both in the professional and academic spheres is wrong.&lt;br /&gt;
&lt;br /&gt;
I'll also explain why it's a reflection on why I'm more likely to hire a half decent coder than a security graduate these days, so if you're currently studying and/or looking to get a a job in application security / ethical hacking in the near future this might be your ticket!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP July Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Eoin Keary - Security Boot camp''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 16th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 13:00pm &amp;lt;br&amp;gt;Talks Start: 13:00pm &amp;lt;br&amp;gt; Event finishes at 17:30pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration Members. [https://myowasp.force.com/login Members register here])''&lt;br /&gt;
''(Registration Non-Members. [https://myowasp.force.com/MN4__PublicEventRegistration?id=a2oU0000000TZAOIA4 Non-Members register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Thanks to Morgan McKinley for sponsoring the event&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Security Boot Camp'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Eoin Keary – CTO BCC Risk Advisory  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Eoin was on the  international board of OWASP,  the Open Web Application Security Project  from 2009-2015 and during his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, OWASP CISO Guide and the OWASP Cheat Sheet Series. &lt;br /&gt;
&lt;br /&gt;
Eoin is a well-known technical leader in industry in the area of software security and penetration testing, and has led global security engagements for some of the world's largest financial services and consumer products companies. He is the CTO and founder of BCC Risk Advisory which deliver professional security services and edgescan.com, a managed cloud-based SaaS, web vulnerability service.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
All - Please join us for a free security boot camp.....&lt;br /&gt;
&lt;br /&gt;
OWASP is hosting a special FREE security boot camp for all Owasp members and local developers. &lt;br /&gt;
The training is recommended for developers who want to learn more about securing their code.&lt;br /&gt;
Presented by Eoin Keary, this intensive boot camp focuses on the most common web application security problems, including aspects of both the OWASP Top Ten and the MITRE Top 25.&lt;br /&gt;
The course will introduce and demonstrate application security techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code and understand fixes.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
=== OWASP June Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Jason Flood (IBM) &amp;amp; Paul Mooney (Free Lance)''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 16th June&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location Hilton Dublin&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Charlemount Place, Dublin 2 '''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Hilton+Dublin/@53.330893,-6.259998,15z/data=!4m2!3m1!1s0x0:0x5b92598f4735994e?sa=X&amp;amp;ved=0CIQBEPwSMAtqFQoTCMyG-cibhcYCFQaWLAodAFAAeg Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-june-event-hilton-dublin-jason-flood-paul-mooney-tickets-17318536208register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Thanks to Morgan McKinley for sponsoring the event&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Understanding cyber gaps in the human'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Jason Flood – Ethical Hacker IBM  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Capture the Flag tournament, also known as a CTF is a framework often found at conferences such as IRISS, OWASP, Blackhat and many more. For the last number of years as part of my PhD research I have been creating CTF frameworks that operate at local, national and international levels, some of you may have played them or at least seen them, and looking at the results.&lt;br /&gt;
 &lt;br /&gt;
These CTF events were built using a variety of architectures, network topologies and programming languages. The challenges they presented also varied both in complexity of exploit and potential organisational damage if exploited.&lt;br /&gt;
&lt;br /&gt;
Today we see attack know-how and attacker tools being freely traded on the internet, enabling hackers and exposing organisations to an even greater communal risk. Arguably it can be said that every organisation no matter the size needs a business plan.  If that business has an online footprint, then a part of that plan needs to focus on it's own cyber risk profile.&lt;br /&gt;
&lt;br /&gt;
Join us to explore how CTF applied methodologies can be used as part of business decisions around resource management, defensive technology solutions, defect management and other aspects of business activities that are associated with operating in a hostile environment such as the internet.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' The Encrypted Token Pattern CSRF Defence'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Paul Mooney –     Freelance, Ryanair Labs, insidethecpu.com''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I’m the creator of the Encrypted Token Pattern and ARMOR, its .NET implementation.&lt;br /&gt;
I specialise in taking apart problems, designing solutions, and providing those solutions as downloadable software frameworks, available under the MIT License.&lt;br /&gt;
I’m a Software Architect, happiest when designing solutions to problems from a conceptual point-of-view, while getting my hands dirty assembling the nuts and bolts. For that reason, I try to avoid titles; if I had to brand myself, I’m a Technology Consultant.&lt;br /&gt;
I’m most accomplished in C# in terms of language, however I’m also very proficient in JavaScript, Java, and Google Go.&lt;br /&gt;
I’m a software-development mentor, and enjoy guiding teams of engineers toward effective technology-driven solutions to real-world problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Encrypted Token Pattern is a defence mechanism against Cross Site Request Forgery (CSRF) &lt;br /&gt;
attacks, and is an alternative to its sister-patterns; Synchroniser Token, and Double Submit Cookie. &lt;br /&gt;
This article discusses the merits and means of implementing this defence mechanism in web-based &lt;br /&gt;
applications. &lt;br /&gt;
&lt;br /&gt;
''Brief Description'' &lt;br /&gt;
The Encrypted Token Pattern &lt;br /&gt;
The Encrypted Token Pattern leverages a single token, as opposed to dual tokens, and offers a more &lt;br /&gt;
narrow scope of failure than alternative CSRF protection patterns. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Leveraging the Encrypted Token Pattern &lt;br /&gt;
The Advanced Resilient Mode of Recognition (ARMOR) is a C# implementation of the Encrypted &lt;br /&gt;
Token Pattern, available on GitHub under the MIT license that provides a means of protecting &lt;br /&gt;
ASP.NET applications from CSRF attacks, by leveraging the Encrypted Token Pattern. A Java &lt;br /&gt;
equivalent of ARMOR is under construction and will be available soon. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ARMOR &lt;br /&gt;
ARMOR is a framework composed of interconnecting components exposed through custom web- &lt;br /&gt;
handlers. ARMOR is essentially an advanced encryption and hashing mechanism, leveraging the &lt;br /&gt;
Rijndael encryption standard, and SHA256 hashing by default.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
=== OWASP March Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event - Denim Group - Dan Cornell &amp;amp; John Dickson''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 26th March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-dublin-chapter-event-denim-group-dan-cornell-john-dickson-tickets-16065539461 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking throughout,beer and pizza thanks to Morgan Mckinley&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Managing Your Application Security Program with the ThreadFix Ecosystem'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Dan Cornell – Denim Group - (https://www.linkedin.com/in/dancornell) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As Chief Technology Officer and Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. Cornell is an active member of the development community and a sought-after speaker on topics of web application security, speaking at international conferences including RSA Security Conference, OWASP AppSec USA and EU and Black Hat Arsenal.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source application vulnerability management system that helps automate many common application security tasks and integrate security and development tools. This tutorial will walk through the capabilities of the ecosystem of ThreadFix applications, showing how ThreadFix can be used to: Manage a risk-ranked application portfolio Consolidate, normalize and de-duplicate the results of DAST, SAST, IAST and other application security testing activities and track these results over time to produce trending and mean-time-to-fix reporting Convert application vulnerabilities into software defects in developer issue tracking systems Pre-seed DAST scanners such as OWASP ZAP with application attack surface data to allow for better scan coverage Instrument developer Continuous Integration (CI) systems such as Jenkins to automatically collect security test data Map the results of SAST and DAST scanning into developer IDEs The presentation walks through these scenarios and demonstrates how ThreadFix, along with other open source tools, can be used to address common problems faced by teams implementing software security programs. It will also provide insight into the ThreadFix development roadmap and upcoming enhancements.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' AppSec Survey 2.0: Fine-Tuning an AppSec Training Program Based on Data'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''John Dickson – Denim Group''' (https://www.linkedin.com/pub/john-b-dickson-cissp/0/149/41a)&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
John Dickson is an internationally recognized security leader, entrepreneur and Principal at Denim Group, Ltd. He has nearly 20 years hands-on experience in intrusion detection, network security and application security in the commercial, public and military sectors. As a Denim Group Principal, he helps executives and Chief Security Officers (CSO’s) of Fortune 500 companies and government organizations launch and expand their critical application security initiatives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Measuring the effectiveness of any security activity is widely discussed – security leaders debate the topic with a religious fervor rivaling that of any other hot button issue. Virtually every organization has some sort of application security training effort, but data on training effectiveness remains scarce. Last year our research team delivered the first-ever survey that captured developer awareness of secure coding concepts and the impact of formal application security training on a developer’s ability to write secure code. We learned that most software developer were aware of certain application security concepts, yet when asked how to write more secure code, they faired poorly. This year’s 600-developer survey provides more quantitative data on what software developers understand about application security, both concepts and practices. It dives most deeply into awareness of defensive coding practices, which most developers largely did not grasp in the 2013 survey. It also is separates respondents by roles, so we can better understand how architects, developers, and QA staff grasp key application security concepts and put them to work. It better captures how software developers learn in general, so one can tailor any security training effort to how software developers, in practice, actually learn. This information will provide data to application security managers responsible for corporate security training that should allow them to make more fact-based decisions about security training.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP December Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event – David Rook/ Mark Hillick - Riot Games''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th December&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-chapter-meeting-riot-games-tickets-14523051839 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking throughout,and pizza thanks to Morgan Mckinley&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Leveling up a global application security awareness program'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''David Rook - Riot Games - (http://ie.linkedin.com/pub/david-rook/3/41a/b1b) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David Rook is a Security Engineer focusing on Application Security at Riot Games in Dublin. David held various application security roles in the financial services industry since 2006 before moving into the computer games industry in early 2014. He has been a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja.&lt;br /&gt;
 &lt;br /&gt;
David strives to practice what he preaches and has backed up his work experience by developing two open source security code review tools called Agnitio and the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The talk will focus on Riot application security awareness and knowledge sharing in a global company. I will talk about the application security awareness efforts we've implemented this year to bring application security knowledge to software engineers worldwide. These awareness efforts were designed to educate and support engineers around the world who work on high profile web properties and one of the worlds most popular computer games.&lt;br /&gt;
&lt;br /&gt;
I will explain how we've used a combination of traditional and innovative approaches to levelling up our software engineers security knowledge.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Security and how it affects Users and Rioters '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick Security Dude@Riot Games  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a founder of HackEire, a founding member of IrissCert, the first person in Ireland to achieve the GIAC GSE, and has been stoking a passion for security for 14 years.&lt;br /&gt;
 &lt;br /&gt;
Mark leads up the InfoSec team for Riot Games in Europe and is Product Owner of the Security Engineering vertical. Currently he's focused on building a team, engineering cool solutions, levelling the security program, finding the cloud, dealing with DDOS, and trying to earn Silver next year by himself.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The presentation focuses on one of the major security aspects of Android Applications; rooting detection techniques. Many Apps, including (MDM) Mobile Device Management Agents, implements this check in different ways. The aim of the talk is to explore the effectiveness of these checks, with practical examples and explain the impact, in terms of security, of this control being bypassed or not implemented.&lt;br /&gt;
&lt;br /&gt;
A short demo will show the effects of having root permissions on an application when the application thinks you don't.Mark will be discussing his last 18 months at Riot and the increase in attention to security from both a player and Rioter perspective.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP August Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event – Mobile Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Saturday 30th August&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 09:30am &amp;lt;br&amp;gt;Talks Start: 10:00am &amp;lt;br&amp;gt; Event finishes at 6:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-mobile-security-day-30th-august-tickets-12685176705 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking throughout,and pizza thanks to BCC Risk Advisory (http://www.bccriskadvisory.com/) /edgescan (https://www.edgescan.com/)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''“Waving not Drowning” – Secure Mobile Development.'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Eoin Keary - BCC Risk Advisory - (http://ie.linkedin.com/in/eoinkeary) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP board member since 2009. Elected to position of global Vice Chair, September 2011. A long-time member of OWASP. Based in Dublin and director of BCC Risk Advisory Ltd. Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com. He is currently on the global board of the OWASP foundation, he was elected to the board in 2009. During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy.&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this talk Eoin shall discuss aspects of securing mobile apps from a source code standpoint. He shall discuss common pitfalls and associated with developing secure applications, why such issues are important and discuss “war stories” relating to  real-world mobile app [in]security.&lt;br /&gt;
&lt;br /&gt;
This talk is suited to anyone involved in developing, managing development or testing mobile applications for security and robustness.&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Android rooting detection: how and why? '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Giuliano Fasto – Espion – (http://uk.linkedin.com/in/giulianofasto) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Giuliano Fasto is a Security Consultant with more than six years of experience in the IT Security field.  He has worked as a Security Consultant and Penetration Tester for well-respected security companies in Italy, the UK and Ireland.  His academic background includes a BSc in IT Security and an MSc in Information Security and Audit. While he has a wide-ranging experience in penetration testing various systems and technologies, in recent years he has specialised in mobile application security testing, particularly on Android and iOS platforms.  He is currently the lead mobile application tester at Espion.&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The presentation focuses on one of the major security aspects of Android Applications; rooting detection techniques. Many Apps, including (MDM) Mobile Device Management Agents, implements this check in different ways. The aim of the talk is to explore the effectiveness of these checks, with practical examples and explain the impact, in terms of security, of this control being bypassed or not implemented.&lt;br /&gt;
&lt;br /&gt;
A short demo will show the effects of having root permissions on an application when the application thinks you don't.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Bazuc - A talk about new types of attacks and vulnerabilities being exploited  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Cathal McDaid – AdaptiveMobile - (http://ie.linkedin.com/pub/cathal-mc-daid/3/5b2/b77) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cathal Mc Daid is Head of Data intelligence &amp;amp; Analytics in Adaptivemobile, and is responsible for a team dedicated to analysing and uncovering new threats to mobile operators and subscribers, using advanced ‘big data’ techniques. Cathal has 14 years experience in telecoms and wireless. Currently he is also Chairman of the GSMA’s Mobile Malware Group - who coordinates the world's response to mobile malware. His academic background includes a BEng in Computer Engineering from UL and an Executive MBA from INSEAD.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Recent discussions and news about mobile malware primarily talk about new types of attacks and vulnerabilities being exploited. However what do you do when a user knowingly infects his handset for monetary gain?. In this presentation we will discuss a new type of mobile bad-ware, that promised and delivered the user money, in exchange for the renting out of his mobile device for unknown purposes. We discuss the app profile, tactics and impacts - on the users, on the network and on the stock market. &amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' OWASP Security Shepherd project '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Mark denihan &amp;amp; Sean Duggan IBM (http://ie.linkedin.com/in/markdenihan , http://ie.linkedin.com/in/seankduggan ) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is currently working on the IBM Ethical Hacking Team, the OWASP Dublin Board and founded of the OWASP Security Shepherd Project. He got his MSc in Information Security and Digital Forensics in the ITB and a BSc in Computing in the DIT. He also suffers from a love of caffeine and deep paranoia thanks to his extreme security enthusiasm.&lt;br /&gt;
&lt;br /&gt;
Sean has a BSc Computing from Dublin Institute of Technology, currently working in IBM with a passion for Android App Security and Development. He developed an interest in Mobile Application Security after reading about the OWASP Mobile Top Ten Risks in 2012 and has since been keeping up to date with Mobile App Issues. Sean leads the development of the mobile components in the OWASP Security Shepherd project.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skill¬set demographic.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd covers the OWASP Top Ten web app risks and has recently been injected with totally new content to cover the OWASP Top Ten Mobile risks as well. Many of these levels include insufficient mitigations and protections to these risks, such as blacklist filters, atrocious encoding schemes, barbaric security mechanisms and poor security configuration. &lt;br /&gt;
&lt;br /&gt;
The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well. We're going to speak about the platform itself and what it offers someone wishing to teach or learn about mobile and web application security, such as the project’s anti plagiarism mechanisms or it’s flexible approach in presenting its users with lessons and resources.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' CTF'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CTF Using the above OWASP Security Shepherd project. &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
''Please bring a laptop with Zed Attack Proxy/ Burp installed''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Format for the day will be '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
9:30-10.00 -- Registration/ Networking&amp;lt;BR&amp;gt;&lt;br /&gt;
10:00-11:00 -- Speaker 1 50-55mins Talk&amp;lt;BR&amp;gt; &lt;br /&gt;
11:00-12:00 --Speaker 2 50-55mins Talk &amp;lt;BR&amp;gt;&lt;br /&gt;
12:00-1:00 --  Speaker 3 50-55mins Talk &amp;lt;BR&amp;gt;&lt;br /&gt;
1:00-1:50 --Lunch &amp;lt;BR&amp;gt;&lt;br /&gt;
2:00-6:00 -- Mobile Shepherd talk leading into CTF. '''Please bring a laptop with Zed Attack Proxy/ Burp installed''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event (2)===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Matt Johansen Sr. Manager for the Threat Research Center at WhiteHat Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 22nd May&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-may-tickets-11644682559 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to WhiteHat Security - https://www.whitehatsec.com/ &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''*&amp;quot;Top 10 Web Hacks of 2013&amp;quot;*'''&lt;br /&gt;
&lt;br /&gt;
'''Matt Johansen Sr. Manager for the Threat Research Center at WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
Matt Johansen is a Sr. Manager for the Threat Research Center at WhiteHat Security where he manages a team of Application Security Specialists, Engineers and Supervisors to prevent website security attacks and protect companies' and their customers' data. Before this he was an Application Security Engineer where he oversaw and assessed more than 35,000 web applications that WhiteHat has under contract for many Fortune 500 companies across a range of technologies.&lt;br /&gt;
 &lt;br /&gt;
He was previously a security consultant for VerSprite, where he was responsible for performing network and web application penetration tests. Mr. Johansen is also an instructor of Web Application Security at Adelphi University, where he received his Bachelor of Science in Computer Science, and San Jose State University. He has also been utilized by the SANS Institute as an industry expert for certification review.&lt;br /&gt;
 &lt;br /&gt;
List of past talks including videos/slides - http://mattjay.github.io/talks/ (BlackHat, DEFCON, RSA, SXSW, Many BSides, etc.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Every year the security community produces a stunning number of new Web hacking techniques that are published in various white papers, blog posts, magazine articles, mailing list emails, conference presentations, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and their mobile platform equivalents. Beyond individual vulnerabilities with CVE numbers or system compromises, we are solely focused on new and creative methods of Web-based attack. Now in its eighth year, the Top 10 Web Hacking Techniques list encourages information sharing, provides a centralized knowledge base, and recognizes researchers who contribute excellent work.&lt;br /&gt;
 &lt;br /&gt;
In this talk, We will do a technical deep dive and take you through the Top 10 Web Hacks of 2013 as picked by an expert panel of judges.&lt;br /&gt;
 &lt;br /&gt;
This year’s winners are:&lt;br /&gt;
&lt;br /&gt;
1 - Mario Heiderich – Mutation XSS&amp;lt;br&amp;gt;&lt;br /&gt;
2 - Angelo Prado, Neal Harris, Yoel Gluck – BREACH&amp;lt;br&amp;gt;&lt;br /&gt;
3 - Pixel Perfect Timing Attacks with HTML5&amp;lt;br&amp;gt;&lt;br /&gt;
4 - Lucky 13 Attack&amp;lt;br&amp;gt;&lt;br /&gt;
5 - Weaknesses in RC4&amp;lt;br&amp;gt;&lt;br /&gt;
6 - Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval&amp;lt;br&amp;gt;&lt;br /&gt;
7 - Million Browser Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
8 - Large Scale Detection of DOM based XSS&amp;lt;br&amp;gt;&lt;br /&gt;
9 - Tor Hidden-Service Passive De-Cloaking&amp;lt;br&amp;gt;&lt;br /&gt;
10 - HTML5 Hard Disk Filler™ API&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event (1)===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Eoin Kearyof BCC Risk Advisory and Matej Saksida of Realex''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 1st May&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-may-tickets-11354041243 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to BCC Risk Advisory (http://www.bccriskadvisory.com/) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: *&amp;quot;Top 10 defensive Java developer controls&amp;quot;*'''&lt;br /&gt;
&lt;br /&gt;
'''Eoin Keary - BCC Risk Advisory - (http://ie.linkedin.com/in/eoinkeary)'''&lt;br /&gt;
&lt;br /&gt;
OWASP board member since 2009. Elected to position of global Vice Chair, September 2011. A long time member of OWASP. Based in Dublin and director of BCC Risk Advisory Ltd.&lt;br /&gt;
Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com. He is currently on the global board of the OWASP foundation, he was elected to the board in 2009. During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy. &lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
In this talk Eoin shall go through a list of developer controls in order to help prevent common security vulnerabilities such those focused in the&lt;br /&gt;
OWASP Top 10 2013. From input validation to contextual output encoding to crypto-secure storage, Eoin shall call out what developers can do to help&lt;br /&gt;
mitigate such issues. Many of the mitigations are simple and use established API's such that developer need not be security experts and just&lt;br /&gt;
use core components to help improve their security posture.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Talk 2: *&amp;quot;Social Engineering - The Art of Human Hacking&amp;quot;.*'''&lt;br /&gt;
&lt;br /&gt;
'''Matej Saksida - Realex Payments - (http://ie.linkedin.com/pub/matej-saksida-cism/20/412/176)'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Nowadays if you want to hack a corporation or damage a personal &amp;quot;enemy&amp;quot; fast, Social Engineering techniques work every time and more often than not&lt;br /&gt;
it works the first time. In this talk Matej shall go through what is social engineering is, types of social engineering and related threats.&lt;br /&gt;
Matej shall call out practical example how to use Facebook to ruin someone's life and what countermeasures can be used against social engineering attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP March Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Rahim Jina of BCC Risk Advisory and Stephen Scott of Espion''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 13th March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-tickets-10802455435 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to Espion (http://www.espiongroup.com/)&lt;br /&gt;
&lt;br /&gt;
Talk 1: Building a shield of security - Vulnerability Management by the numbers and dumb robots!&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory&lt;br /&gt;
&lt;br /&gt;
Rahim has been an active member of OWASP since 2008 and has contributed to many projects such as the OWASP Security Code Review Guide and is an ex-board member of the Irish Chapter. Previously Rahim was a senior security consultant at a “big 4” professional services firm and more recently, the head of security for Fonality Inc, a VoIP service provider based in Los Angeles. Rahim is currently a director for BCC Risk Advisory (bccriskadvisory.com), based in Dublin, Ireland. He is also responsible for the security architecture of the edgescan.comvulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
This presentation discusses how builders, breakers and defenders should look at vulnerability management when attempting to keep hackers at bay. We discuss the most common vulnerabilities which are not detected by security tools nor automation but nevertheless are common and can be used to commit real fraud resulting in financial loss. We will see that Web Application Firewalls are ineffective against such attacks and why the only practical solution is to apply a layered approach across all aspects of the SDLC.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Talk 2: &amp;quot;PCI's Changing Environment - What You Need to Know &amp;amp; Why You Need To Know It&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stephen Scott - Senior Consultant and PCI QSA in Espion's Information Government practice&lt;br /&gt;
&lt;br /&gt;
Stephen Scott, Consultancy Team lead in Espion, is an experienced information security, risk and compliance consultant whose experience spans across many different areas including, PCI DSS, information security, risk management, group internal audit, IT service management and regulatory compliance. Stephen has extensive experience with information security, internal control testing, compliance programmes, information risk management, and process improvement. Stephen has worked across a wide range of industry verticals, including financial, industrial and insurance.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
PCI DSS – The Payment Card Industry Data Security Standard sets common requirements for securing payment card information (credit, debit, some gift cards), and lays out a range of controls relating to auditing, scanning and assessment.&lt;br /&gt;
&lt;br /&gt;
This presentation discusses the ever evolving PCI environment, specifically focusing on the changes in the recent release of version 3 of the PCI DSS standard.  Stephen will start off by giving a brief background to PCI, including motivators for merchant and service providers to adhere to the standard.  In addition to this, the presentation will highlight what security considerations are relevant to application and information security practitioners.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2013 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP July Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Jeremiah Grossman - Another Year in Web Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 17:30 &amp;lt;br&amp;gt;Talk: 18:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.eventbrite.com/event/7127672059 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Jeremiah Grossman of WhiteHat Security will be in Dublin and will be talking at our next chapter event. His talk &amp;quot;Another Year In Web Security: What did 2012 teach us about survival in the coming years?&amp;quot; promises a great insight into the future of web security.&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, founder and CTO of WhiteHat Security, is a world-renowned expert in web application security and a founding member of the Web Application Security Consortium (WASC). At WhiteHat, Mr. Grossman is responsible for web application security R&amp;amp;D and industry evangelism. He is a frequent speaker at industry events including the BlackHat Briefings, ISACA's Networks Security Conference, NASA, ISSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
A trusted media resource, Mr. Grossman has been featured in USA Today, the Washington Post, Information Week, NBC Nightly News, and many others. Mr. Grossman is also a featured expert and frequent contributor on TechTarget'sSearchAppSecurity.com.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP June Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference. [https://www.owasp.org/index.php/EUTour2013#Dublin Info and registration link for the conference])''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event ===&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''TRAINING &amp;amp; TALKS''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Dublin - Realex Payments Application Security Workshop''' == &lt;br /&gt;
'''Thursday 30th May'''&amp;lt;br&amp;gt; ''('''Training'''. 1:30pm- 5:00pm)'' &amp;lt;br&amp;gt;('''Talks'''. 6:00pm - 8:00pm)''&amp;lt;br&amp;gt;[http://www.eventbrite.com/event/6665658163/eorg Click here for more information]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Training'''&lt;br /&gt;
&lt;br /&gt;
Eoin Keary will be delivering free application security training between 2pm and 5pm on the 30th May. Eoin was the founder of OWASP Ireland and is currently the global vice chair for OWASP (amongst many other things!  https://www.owasp.org/index.php/Eoin_Keary). He has delivered application security training to many developers and security professionals around the world and recently delivered a training course to over 400 people at the RSA Conference.&lt;br /&gt;
&lt;br /&gt;
The training will focus on secure application development and why we can't hack ourselves secure. It will be covering why penetration testing on its own does not work approaches to improvement including &amp;quot;knowing what you don't know&amp;quot; and how to measure change.&lt;br /&gt;
&lt;br /&gt;
It will be technical training covering XSS eradication, client side security and browser DOM curiosities.&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
The talks will be starting at 6pm in our office and OWASP have arranged two very interesting talks! Diarmaid McManus https://twitter.com/elephant_rb from Realex Payments will be expanding his award winning SecurityBSides London Rookie Track talk https://www.securityninja.co.uk/application-security/securitybsides-london-esp-security-plugin/ to include more details about static analysis approaches and his research and development work on ESP: Security Plugin https://github.com/diarmaid-mcmanus/ESPSecurityPlugin.&lt;br /&gt;
&lt;br /&gt;
Hugh Pearse https://twitter.com/hughpearse will be talking about Low Level Exploits and this looks like it will be a great talk:&lt;br /&gt;
&lt;br /&gt;
“In 2010 Mr Haroon Meer from thinkst.com presented a timeline of memory corruption vulnerabilities and their mitigation techniques dating from 1985 to 2010. In his 35 page publication he referenced almost 150 events in low level information security history. The scope of the presentation &amp;quot;Low Level Exploits&amp;quot; is to explain in detail some of the most significant attacks in from Haroon Meers research. The attacks covered in this presentation include buffer overflows on the stack, heap overflows, integer overflows, format strings, null pointers and ROP chains. This brings us to exploits in the present day where researchers are looking for the successor of the buffer overflow attack, next big exploit.”&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2011 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== [[Ireland/Training/OWASP projects and resources you can use TODAY]] ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp logo Ireland Training 11 March 2010.gif]]&lt;br /&gt;
&lt;br /&gt;
*'''Overview &amp;amp; Goal'''&lt;br /&gt;
**Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle. &lt;br /&gt;
**This course aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them. &lt;br /&gt;
**The course will be very practical where demonstration and hands-on exercises will be provided for the tools covered. &lt;br /&gt;
**If you are interested in participating in the hands on portion of the course, please bring a laptop. &lt;br /&gt;
*'''Dates'''&lt;br /&gt;
**March, 2011, 11&lt;br /&gt;
*'''Course Main Content and Registration'''&lt;br /&gt;
**[[Ireland/Training/OWASP projects and resources you can use TODAY|Click here]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dublin2010.gif]]&lt;br /&gt;
&lt;br /&gt;
Click [[OWASP IRELAND 2010]] for more information &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010 Agenda  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== AUG 2010  ====&lt;br /&gt;
== OWASP August Event ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 11/8/2010 6:00pm - 8:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' OWASP ESAPI Swingset: Introduction &amp;amp; Demo by Cathal Courtney&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The ESAPI Swingset is a web application which demonstrates common security vulnerabilities and asks users to secure the application against these vulnerabilities using the ESAPI library. The application is intended for Java Developers. The goal of the application is to teach developers about the functionality of the ESAPI library and give users a practical understanding of how it can be used to protect web applications against common security vulnerabilities. During the talk, Cathal will demonstrate how to install and use ESAPI Swingset in your organization. A copy of the latest version will be also provided to the attendees.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Cathal is an experienced developer working at AIB and is currently the ESAPI Swingset project leader. More information about this project could be found here: [http://www.owasp.org/index.php/ESAPI_Swingset Esapi SwingSet]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' Not available&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' Security Implications for Web Applications based on SOA by John Marmelstein&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The main point of SOA (in this context) is combining systems and applications to make new applications, or a big 'overall' application.This higher inter-operability does (by default) lower security. For a start, a request originating from a web user might end up at several back end systems, which do not know who or what the request came from.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each back end system might have no access to the customer data, have a different security models, and serve serveral front end. Each of the above systems could be under different ownership, thus the owners have different concerns and priorities. Also, the basic solution at a technical level include single sign on, or security as a service. This can be costly, give limited coverage and have a performance hit. But is pretty much the only way to do it. The other thing to do (probably in tandem) is strict management, and delegation of authority.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John has about 13 years in IT. Most of this in distributed systems and 'Middleware' integration software. Including BEA (now owned by Oracle). Mainly working on Enterprise Java and more recently on Microsoft BizTalk. Various industries, incuding financials, public services, and a fish farm.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== SEP 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND 2010  ==&lt;br /&gt;
&lt;br /&gt;
Due to popular demand we are hosting the 2nd OWASP IRELAND event, '''OWASP Ireland 2010'''. &amp;lt;br&amp;gt;Continuing last years highly successful conference, with more than 150 attendees from across the globe OWASP is happy to repeat this positive experience. &amp;lt;br&amp;gt;Delegates from numerous industry verticals attended the 2009 event; from government to finance to telecoms. Share your thoughts at this open event with some of the most experienced individuals in the information security industry. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_IRELAND_2010 [[Image:Dublin2010.gif]]]&amp;lt;br&amp;gt;[[OWASP_IRELAND_2010]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' '''September 17th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Trinity College Dublin, The Hamilton Building &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [[Eoin Keary|Eoin Keary]]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Subscribe to the OWASP Ireland [https://lists.owasp.org/mailman/listinfo/owasp-ireland mail list] for the up-to-date information.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OCT 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== NOV 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== DEC 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 2010 Chapter Plan  ====&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Educational Outreach&amp;lt;br&amp;gt;Summary: Drive education awareness of OWASP among Irish Universities and Third Level Institutions. &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Fabio Cerullo &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Industry Outreach&amp;lt;br&amp;gt;Summary: Raise awareness of OWASP among Irish industry.&amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Eoin Keary&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Membership Drive &amp;lt;br&amp;gt;Summary: Increase local chapter members individuals and corporate supporters &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Project Participants: Rahim Jina&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Hands-On Training&amp;lt;br&amp;gt;Summary: Provide 1-day, 3-day and 5-day hands-on classroom / online training classes&amp;lt;br&amp;gt;Next Milestone: Organize Training Offerings&amp;lt;br&amp;gt;Project Participants: Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Call For Presentations for 2010 is now open - please contact fcerullo(@)owasp.org / +353877817468 if you would like to speak or can host a meeting. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;*Note meeting hosts are provided with annual chapter sponsorship and free seats in training classes. The OWASP Foundation, Ireland chapter focuses on implementation of efforts defined by the [http://www.owasp.org/index.php/Global_Committee_Pages Global Committee] as well as new concepts and ideas defined locally. Below are a list of ACTIVE projects assigned to individual active members and teams within the local chapter. If you would like to help out on ANY of these efforts, contact them directly to get involved &lt;br /&gt;
&lt;br /&gt;
==== FEB 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Event - What is the O2 Platform?  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 19/2/2010 3:00pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP O2 Platform - Open Platform for automating application security knowledge and workflows &amp;lt;br&amp;gt;'''Abstract:''' In this talk Dinis Cruz will show the OWASP O2 Platform which is an open source toolkit specifically designed for developers and security consultants to be able to perform quick, effective and thorough 'source-code-driven' application security reviews. The OWASP O2 Platform (http://www.owasp.org/index.php/OWASP_O2_Platform) consumes results from the scanning engines from Ounce Labs, Microsoft's CAT.NET tool, FindBugs, CodeCrawler and AppScan DE, and also provides limited support for Fortify and OWASP WebScarab dumps. In the past, there has been a very healthy skepticism on the usability of Source Code analysis engines to find commonly found vulnerablities in real world applications. This presentation will show that with some creative and powerful tools, it IS possible to use O2 to discover those issues. This presentation will also show O2's advanced support for Struts and Spring MVC. &lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development. For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences. At OWASP, Dinis is the leader of the [[OWASP O2 Platform]] project, member of the OWASP [[Global Projects Committee]], chair of the [[OWASP Connections Committee]] and member of the [[About The Open Web Application Security Project#Global_Board_Members|OWASP Board]]. &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' http://www.o2-ounceopen.com/files-binaries-source-and-demo/old-documents-and-presentations/OWASP_O2_Platform_-_AppSec_Ireland_Sep_2009.pdf &lt;br /&gt;
&lt;br /&gt;
== IISF/OWASP – February Chapter Meeting  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 25/2/2010 2:00pm - 4:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Georgian Suite, Buswells Hotel, Molesworth St., Dublin 2 &lt;br /&gt;
&lt;br /&gt;
'''Title:''' An overview of Web Application Security threats and technologies. Practical advice and techniques for improving Application Security, presented by OWASP. &lt;br /&gt;
&lt;br /&gt;
2:00 - Introduction by IISF Chairman &lt;br /&gt;
&lt;br /&gt;
2:05 - Presentation&amp;amp;nbsp;: “Practical advice for improving Application Security” - Introduction to OWASP and OWASP Top Ten - Demonstration video of typical web based attacks with high level explanation - Live SQL injection demo using WebGoat &amp;amp;amp; WebScarab - Live Cross Site Scripting demo using WebGoat &amp;amp;amp; WebScarab &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part1.ppt]] &lt;br /&gt;
&lt;br /&gt;
3:00 - Coffee &lt;br /&gt;
&lt;br /&gt;
3:20 – Presentation continues - Application Security: &amp;quot;The problems we are faced with&amp;quot; - The Application Security Verification Standard - SDLC &amp;amp;amp; Security Assurance Maturity Model - Code Review versus traditional Runtime Testing. - Q&amp;amp;amp;A &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part2.pptx]] &lt;br /&gt;
&lt;br /&gt;
4:00 - Close of Meeting &lt;br /&gt;
&lt;br /&gt;
4:05 - Traditional networking in Buswells Bar &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP - 26/3/2010  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== APR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Live CD - An open environment for Web Application Security  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 16/4/2010 2:30pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP Live CD - An open environment for Web Application Security &amp;lt;br&amp;gt;'''Abstract:''' This CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. This presentation aims to provide a showcase for the great OWASP tools and documentation materials available in the CD, tips and tricks, and also some introductory stuff regarding code review and penetration testing. &amp;lt;br&amp;gt;Training is aimed at introductory /intermediate level in terms of pen testing, code review and tools. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Rahim Jina''' &amp;lt;br&amp;gt;Rahim Jina currently works as a senior consultant for Ernst &amp;amp;amp; Young's Risk Advisory Services in Dublin. He has worked there for nearly four years primarily delivering penetration testing services to clients globally, focusing on web applications and secure code review. He has been involved with OWASP for the past two years, being involved in the Summer of Code 2008 as lead reviewer for the Code Review Guide 2009. He has also made contributions to the SAMM project (OpenSAMM). He holds an MSC in Security and Forensic Computing from DCU and a degree in computer science from Trinity college. &amp;lt;br&amp;gt;'''Eoin Keary''' &amp;lt;br&amp;gt;Eoin is a long time member of OWASP and have contributed year on year to OWASP projects and the OWASP mission of fighting the causes of software insecurity. He is based in Dublin, Ireland and run the Ernst &amp;amp;amp; Young application security team across Europe. His OWASP contributions to date include the OWASP Code Review Guide, OWASP Testing Guide, OWASP SAMM, and OWASP ASVS. He is a member of the OWASP Global Industry Committee, chair of the OWASP Conferences Committee and member of the OWASP Global Board. Eoin founded the OWASP Ireland chapter back in 2004 and currently serves as Vice President of the OWASP Ireland Board. &lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/d/db/P1040923_1024.JPG [[Image:|P1040923_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/d/db/P1040923_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/f/f3/P1040927_1024.JPG [[Image:|P1040927_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/f/f3/P1040927_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/6/64/P1040929_1024.JPG [[Image:|P1040929_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/6/64/P1040929_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
'''Download Presentation:''' [http://www.owasp.org/images/e/ee/OWASP_Live_CD.pptx [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After OWASP Live CD training &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAY 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Trials &amp;amp;amp; Tribulations of WAF Implementation  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Trials &amp;amp;amp; Tribulations of WAF Implementation&amp;lt;br&amp;gt;'''Abstract:''' A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&amp;lt;br&amp;gt;Mark will be presenting on his experience in implementing a Web Application Firewall solution through all phases from research to implementation. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick - Application Networking Team, Citrix Systems''' &amp;lt;br&amp;gt;Mark Hillick has 10 years experience in relation to Internet, networking, systems administration and security engineering. &lt;br /&gt;
&lt;br /&gt;
Mark graduated from Queen's University, where he studied Mathematics. &lt;br /&gt;
&lt;br /&gt;
Mark joined AIB from Queen's where he joined the Internet Infrastructure team, where he was responsible for designing, building and securing the Internet service in and out of AIB. He is a prominent member of the IT Security community in Ireland and has presented at several local security forums such as IISF and Owasp. Mark is one of the founding members of IRISS CERT, where he is also a Volunteer Incident Handler. He helped organise IRISSCon 2009, where he also designed and built HackEire 2009, the first Ethical Hacking 'Capture The Flag' contest in Ireland.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[Image:20052010017.jpg|thumb|A caption from Mark's talk]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [http://docs.google.com/fileview?id=0B3vrVYEosFeEZDMyZjIzYTktMzNkZC00ZjBlLWFiYTgtNThjZGE4YTE1NmFj [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After WAF presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUN 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Define Security Requirements - A practical approach  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Define Security Requirements - A practical approach&amp;lt;br&amp;gt;'''Abstract:''' The Data Protection Act states that &amp;quot;appropriate security measures&amp;quot; must be taken to protect personal data. How do you specify the appropriate security measures for a website which processes personal data? It is an important step in a development project, but is often neglected. In this talk, Alexis will descibe his own experiences of assessing web application, and will also look in more detail at what the Data Protection Commissioner says. He will then take a fictional website and look at a practical approach to specifying the security requirements that the fictional application should meet. This will use the kind of risk-based techniques outlined by OWASP or the Microsoft Secure Development Lifecycle (SDL). Issues discussed will include encryption, authentication, access control, audit, etc. The result will be a list of security requirements that can be carried into the design and development phases. Attendees should be able to apply the ideas to their own development projects. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Alexis Fitzgerald - Rits Information Security Group''' &amp;lt;br&amp;gt;For the last six years Alexis has worked for Rits Information Security Group, where he performs application penetration testing assignments as well as advising clients on application security issues. Before that, he spent many years as a developer (mainly in the financial sector), and he continues to be involved in development. Alexis holds an MSc in Information Security from the University of London, Royal Holloway.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:OWASP Ireland June10.pdf]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After Alexis presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUL 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Ireland]]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dublin&amp;diff=212269</id>
		<title>Dublin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dublin&amp;diff=212269"/>
				<updated>2016-04-01T12:17:46Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ireland|extra= [[File:Owasp_logo_ireland_small.jpg]]| mailinglistsite=https://lists.owasp.org/mailman/listinfo/owasp-ireland}} become a [http://www.owasp.org/index.php/Membership#Categories_of_Membership_.26_Supporters Member or Annual Chapter Sponsor(s)]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact ANY of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:Owen.Pendlebury(at)owasp.org mail[[User:Owen Pendlebury|Owen Pendlebury]]] +353876605277&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Mark.Denihan(at)owasp.org Mark Denihan]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/ Global Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Tony.Clarke(at)owasp.org Tony Clarke]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP Ireland'''&amp;lt;br&amp;gt;40 Block E, Smithfield Market Smithfield &amp;lt;br&amp;gt; Dublin 7, Ireland &amp;lt;br&amp;gt;Tel: +353876605277 &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== OWASP Dublin Chapter 2016 ==&lt;br /&gt;
=== OWASP March Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Session 1 – Data Protection / Session 2 - Working in IT Security Panel  ''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 31st March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-march-event-session-1-general-data-protection-regulation-gdpr-session-2-working-in-it-tickets-23939161677register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Thanks to Morgan McKinley for sponsoring the event&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
'''Session 1 – Hugh Jones - General Data Protection Regulation (GDPR) ''' [[File:OWASP_INtro_to_GDPR_1603.ppt]]&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
With the current EU legislation passing its 20th year back in October, it is high time that the EU Data Protection regime caught up with everything that is happening in the commercial, technological and social media sectors. The EU Commission has recently published the final draft of the new General Data Protection Regulation (GDPR), scheduled to take effect across the EU in early 2018. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
For organisations who already have a culture of DP compliance in place, the new Regulation will introduce a few changes, but nothing particularly challenging. For those who have ignored or failed to step up to the 1995 Directive, the next two years could be a very busy time indeed! &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
This overview of the Regulation provides an understanding of the key concepts contained in the new legislation, the main areas of change, and some good advice on the steps which organisations need to take in order to prepare in a timely and organised manner.&lt;br /&gt;
The key motto being: “Don’t Panic!”” &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''Session 2 – Working in IT Security'''&lt;br /&gt;
 &lt;br /&gt;
A panel of experts will discuss what it is like to work in IT Security industry in Ireland. The aim is of this session is to give the audience an overview of the different types of roles and opportunities in IT Security and afford the audience an opportunity to ask questions in relation to any aspect of IT Security. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''1. Jason Flood– CTO IBM'''&amp;lt;BR&amp;gt; &lt;br /&gt;
 &lt;br /&gt;
Jason Flood is currently completing his Phd at the Institute of Technology in Blanchardstown. He is also heavily involved in the Security Research Lab, located in the Learning &amp;amp; Innovation Centre in ITB. His main research area is in the field of cyber-security and risk analysis. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Jason is founder of the Irish honeynet project and contributor to OWASP. He is also a board member of InfoSecurity Ireland. Jason is the CTO in IBM in the security space. Jason has helped deliver numerous Capture-the-Flag events at both a local, national and international level over the last 5 years for events such as Appsec, Source and IRISS. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''2. Dara Boland – Morgan McKinley'''&amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Dara Boland heads up Morgan McKinley’s Information Security Recruitment team. He is a connector, blogger and market leader who is constantly helping companies locate and hire the right people, across the whole spectrum of Information Security. Dara has an extensive network and reputation in Ireland and across Europe. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''3. Hugh Callaghan – Executive Director EY '''&amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Hugh is the Executive Director in our EMEIA Financial Services Advisory team with responsibility for leading our rapidly growing Advanced Security Centre, which is EY’s market-leading capability hub for delivering cyber security services to large domestic and multinational clients. Hugh has previous experience of large-scale technical security testing programmes, online banking fraud strategy, business-driven security architecture, cyber security roadmap definition and improvement programme delivery. Hugh currently has a significant focus on helping both boards and top executive management understand the implications of the cyber security threat environment in the context of their businesses, consistent with EY’s mission of making the digital world a safer place to do business. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Hugh is a research scientist by background, with a Ph.D. in computational physics from University College Cork and the Max Planck Institute, Germany. Hugh joined EY in 2003 from an international electronic payments company. &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''4. Rahim Jina – Director BCC Risk Advisory'''&amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Rahim is a director in BCC Risk Advisory and parent company of edgescan™, based in Ireland. Prior to this, Rahim was Head of Security for Fonality, a VOIP provider based in Los Angeles and was also a senior security consultant for a ‘Big 4’ consultancy firm for many years. Rahim has a degree in Computer Science from Trinity College Dublin and an MSc in Security &amp;amp; Forensic Computing from Dublin City University. Rahim has been an OWASP contributor and volunteer since 2007.  &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
'''5. Declan Timmons – Principal Security Consultant Ward Solutions ''' &amp;lt;BR&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Declan is Ward Solutions Principal Security Consultants in Forensics and e-Discovery operating at both the consultative and practitioner level.  Originally a member of the defence forces in Ireland, Declan has a 1st class honours masters in cybercrime and forensics investigations, as well as a Certified Encase Forensics Examiner (EnCE), Certified Information Security Manager (CISM), and ISO-27001 Lead Auditor. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''6. Leonard McAuliffe – Director - Cyber Security and Forensics at PwC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Leonard leads the Cyber Security and Forensics practice for PwC Ireland. Leonard has worked in the area of Cyber Security and Forensics for over 17 years and had delivered Cyber Security and Forensics services to many top international and national clients in many sectors. Some of Leonard’s Cyber Security areas of expertise include Cyber Strategy and Operating Models, Governance &amp;amp; Program Management,Cyber Security Architecture, Cyber Security Standards, Data Protection and Privacy, Identity and Access Management, Vulnerability Management, Ethical Hacking, Application Security, Cloud Security, Mobile Device Management, infrastructure and operational security reviews.&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org''' or Tony Clarke on '''tony.clarke(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP February 2016 Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Gavin O’Gorman and Alain Abou Tass ''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 25th February&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration  [https://www.eventbrite.com/e/owasp-february-event-gavin-ogorman-and-alain-abou-tass-tickets-21790679509 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
We are delighted to to welcome Gavin O’Gorman and Alain Abou Tass for our latest OWASP Dublin Chapter meeting. Registration will start from 6:30pm 25th February with talks beginning at 7:00pm.&lt;br /&gt;
&lt;br /&gt;
There will be beer and Pizza generously provided by Morgan McKinley&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gavin O’Gorman– Symantec - '''  &lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Working in Symantec for the past six years, Gavin is an intelligence analyst on the attack investigations team. Before moving to the attack investigations team in 2013, he worked as a reverse engineer, and later as an incident handler. Gavin’s primary role is to gather together information from both Symantec data sources, and open sources, in order to build a comprehensive picture of an attack, or attackers. Another aspect of the job is to work with law enforcement to assist in the investigation of e-crime where possible. Prior to working in Symantec, Gavin spent several years researching network security in Dublin City University, and currently lectures part-time for the Masters in Security &amp;amp; Forensics course. &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''' Alain Abou Tass – Ward Solutions - Web applications on the battlefield''' [[File:Battle20160225-V1.0.0.pptx]]&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Penetration testers spend most of their time identifying security holes. Sometimes if we’re lucky enough, we hit the jackpot. In this talk, I will be detailing some instances of real life attacks on web applications. I’ll show how one small vulnerability, in conjunction with others, can be lethal and lead to a big breach. This will highlight the importance of fixing the small issues that are usually neglected. Also, I’ll show some interesting tricks that can be used to exploit existing vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2015 ==&lt;br /&gt;
=== OWASP December Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Tony Clarke and William Bailey ''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 10th December&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration  [https://www.eventbrite.com/e/owasp-december-event-christmas-party-tony-clarke-will-bailey-tickets-19873992647 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | The event will be followed by our annual Christmas party in a location to be decided. I would like to thank our sponsors Ward Solutions, Integrity 360,BH Consulting, Edgescan and Morgan McKinley. There will be a raffle during the event for a Samsung Galaxy Tab. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tony Clarke – ICON PLC - Application security in a cyber security program'''  [[File:OWASP-v1.0.pptx]]&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Data breaches such as the recent Talk Talk and Vtech breaches are regularly reported on in the media and its clear that existing approaches to application security are flawed and failing. This session will examine application security in the context of a cyber security program and will outline an approach to application security which facilitates modern development practices and standards. The session will examine security models, controls, processes and metrics which are required to prevent, detect and respond to these types of breach and integrate with operational models and compliance requirements.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Will Bailey – IBM - Drop your breaches'''  [[File:OWASP_will_20151210.pptx]]&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
In this talk, I'll cover how we could be doing a much better job of improving the security of applications by educating developers better and why the approach a lot of the current security education employs both in the professional and academic spheres is wrong.&lt;br /&gt;
&lt;br /&gt;
I'll also explain why it's a reflection on why I'm more likely to hire a half decent coder than a security graduate these days, so if you're currently studying and/or looking to get a a job in application security / ethical hacking in the near future this might be your ticket!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP July Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Eoin Keary - Security Boot camp''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 16th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 13:00pm &amp;lt;br&amp;gt;Talks Start: 13:00pm &amp;lt;br&amp;gt; Event finishes at 17:30pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration Members. [https://myowasp.force.com/login Members register here])''&lt;br /&gt;
''(Registration Non-Members. [https://myowasp.force.com/MN4__PublicEventRegistration?id=a2oU0000000TZAOIA4 Non-Members register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Thanks to Morgan McKinley for sponsoring the event&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Security Boot Camp'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Eoin Keary – CTO BCC Risk Advisory  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Eoin was on the  international board of OWASP,  the Open Web Application Security Project  from 2009-2015 and during his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, OWASP CISO Guide and the OWASP Cheat Sheet Series. &lt;br /&gt;
&lt;br /&gt;
Eoin is a well-known technical leader in industry in the area of software security and penetration testing, and has led global security engagements for some of the world's largest financial services and consumer products companies. He is the CTO and founder of BCC Risk Advisory which deliver professional security services and edgescan.com, a managed cloud-based SaaS, web vulnerability service.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
All - Please join us for a free security boot camp.....&lt;br /&gt;
&lt;br /&gt;
OWASP is hosting a special FREE security boot camp for all Owasp members and local developers. &lt;br /&gt;
The training is recommended for developers who want to learn more about securing their code.&lt;br /&gt;
Presented by Eoin Keary, this intensive boot camp focuses on the most common web application security problems, including aspects of both the OWASP Top Ten and the MITRE Top 25.&lt;br /&gt;
The course will introduce and demonstrate application security techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code and understand fixes.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
=== OWASP June Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Jason Flood (IBM) &amp;amp; Paul Mooney (Free Lance)''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 16th June&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location Hilton Dublin&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Charlemount Place, Dublin 2 '''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Hilton+Dublin/@53.330893,-6.259998,15z/data=!4m2!3m1!1s0x0:0x5b92598f4735994e?sa=X&amp;amp;ved=0CIQBEPwSMAtqFQoTCMyG-cibhcYCFQaWLAodAFAAeg Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-june-event-hilton-dublin-jason-flood-paul-mooney-tickets-17318536208register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Thanks to Morgan McKinley for sponsoring the event&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Understanding cyber gaps in the human'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Jason Flood – Ethical Hacker IBM  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Capture the Flag tournament, also known as a CTF is a framework often found at conferences such as IRISS, OWASP, Blackhat and many more. For the last number of years as part of my PhD research I have been creating CTF frameworks that operate at local, national and international levels, some of you may have played them or at least seen them, and looking at the results.&lt;br /&gt;
 &lt;br /&gt;
These CTF events were built using a variety of architectures, network topologies and programming languages. The challenges they presented also varied both in complexity of exploit and potential organisational damage if exploited.&lt;br /&gt;
&lt;br /&gt;
Today we see attack know-how and attacker tools being freely traded on the internet, enabling hackers and exposing organisations to an even greater communal risk. Arguably it can be said that every organisation no matter the size needs a business plan.  If that business has an online footprint, then a part of that plan needs to focus on it's own cyber risk profile.&lt;br /&gt;
&lt;br /&gt;
Join us to explore how CTF applied methodologies can be used as part of business decisions around resource management, defensive technology solutions, defect management and other aspects of business activities that are associated with operating in a hostile environment such as the internet.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' The Encrypted Token Pattern CSRF Defence'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Paul Mooney –     Freelance, Ryanair Labs, insidethecpu.com''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I’m the creator of the Encrypted Token Pattern and ARMOR, its .NET implementation.&lt;br /&gt;
I specialise in taking apart problems, designing solutions, and providing those solutions as downloadable software frameworks, available under the MIT License.&lt;br /&gt;
I’m a Software Architect, happiest when designing solutions to problems from a conceptual point-of-view, while getting my hands dirty assembling the nuts and bolts. For that reason, I try to avoid titles; if I had to brand myself, I’m a Technology Consultant.&lt;br /&gt;
I’m most accomplished in C# in terms of language, however I’m also very proficient in JavaScript, Java, and Google Go.&lt;br /&gt;
I’m a software-development mentor, and enjoy guiding teams of engineers toward effective technology-driven solutions to real-world problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Encrypted Token Pattern is a defence mechanism against Cross Site Request Forgery (CSRF) &lt;br /&gt;
attacks, and is an alternative to its sister-patterns; Synchroniser Token, and Double Submit Cookie. &lt;br /&gt;
This article discusses the merits and means of implementing this defence mechanism in web-based &lt;br /&gt;
applications. &lt;br /&gt;
&lt;br /&gt;
''Brief Description'' &lt;br /&gt;
The Encrypted Token Pattern &lt;br /&gt;
The Encrypted Token Pattern leverages a single token, as opposed to dual tokens, and offers a more &lt;br /&gt;
narrow scope of failure than alternative CSRF protection patterns. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Leveraging the Encrypted Token Pattern &lt;br /&gt;
The Advanced Resilient Mode of Recognition (ARMOR) is a C# implementation of the Encrypted &lt;br /&gt;
Token Pattern, available on GitHub under the MIT license that provides a means of protecting &lt;br /&gt;
ASP.NET applications from CSRF attacks, by leveraging the Encrypted Token Pattern. A Java &lt;br /&gt;
equivalent of ARMOR is under construction and will be available soon. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ARMOR &lt;br /&gt;
ARMOR is a framework composed of interconnecting components exposed through custom web- &lt;br /&gt;
handlers. ARMOR is essentially an advanced encryption and hashing mechanism, leveraging the &lt;br /&gt;
Rijndael encryption standard, and SHA256 hashing by default.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
=== OWASP March Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event - Denim Group - Dan Cornell &amp;amp; John Dickson''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 26th March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-dublin-chapter-event-denim-group-dan-cornell-john-dickson-tickets-16065539461 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking throughout,beer and pizza thanks to Morgan Mckinley&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Managing Your Application Security Program with the ThreadFix Ecosystem'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Dan Cornell – Denim Group - (https://www.linkedin.com/in/dancornell) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As Chief Technology Officer and Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. Cornell is an active member of the development community and a sought-after speaker on topics of web application security, speaking at international conferences including RSA Security Conference, OWASP AppSec USA and EU and Black Hat Arsenal.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source application vulnerability management system that helps automate many common application security tasks and integrate security and development tools. This tutorial will walk through the capabilities of the ecosystem of ThreadFix applications, showing how ThreadFix can be used to: Manage a risk-ranked application portfolio Consolidate, normalize and de-duplicate the results of DAST, SAST, IAST and other application security testing activities and track these results over time to produce trending and mean-time-to-fix reporting Convert application vulnerabilities into software defects in developer issue tracking systems Pre-seed DAST scanners such as OWASP ZAP with application attack surface data to allow for better scan coverage Instrument developer Continuous Integration (CI) systems such as Jenkins to automatically collect security test data Map the results of SAST and DAST scanning into developer IDEs The presentation walks through these scenarios and demonstrates how ThreadFix, along with other open source tools, can be used to address common problems faced by teams implementing software security programs. It will also provide insight into the ThreadFix development roadmap and upcoming enhancements.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' AppSec Survey 2.0: Fine-Tuning an AppSec Training Program Based on Data'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''John Dickson – Denim Group''' (https://www.linkedin.com/pub/john-b-dickson-cissp/0/149/41a)&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
John Dickson is an internationally recognized security leader, entrepreneur and Principal at Denim Group, Ltd. He has nearly 20 years hands-on experience in intrusion detection, network security and application security in the commercial, public and military sectors. As a Denim Group Principal, he helps executives and Chief Security Officers (CSO’s) of Fortune 500 companies and government organizations launch and expand their critical application security initiatives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Measuring the effectiveness of any security activity is widely discussed – security leaders debate the topic with a religious fervor rivaling that of any other hot button issue. Virtually every organization has some sort of application security training effort, but data on training effectiveness remains scarce. Last year our research team delivered the first-ever survey that captured developer awareness of secure coding concepts and the impact of formal application security training on a developer’s ability to write secure code. We learned that most software developer were aware of certain application security concepts, yet when asked how to write more secure code, they faired poorly. This year’s 600-developer survey provides more quantitative data on what software developers understand about application security, both concepts and practices. It dives most deeply into awareness of defensive coding practices, which most developers largely did not grasp in the 2013 survey. It also is separates respondents by roles, so we can better understand how architects, developers, and QA staff grasp key application security concepts and put them to work. It better captures how software developers learn in general, so one can tailor any security training effort to how software developers, in practice, actually learn. This information will provide data to application security managers responsible for corporate security training that should allow them to make more fact-based decisions about security training.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP December Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event – David Rook/ Mark Hillick - Riot Games''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th December&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-chapter-meeting-riot-games-tickets-14523051839 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking throughout,and pizza thanks to Morgan Mckinley&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Leveling up a global application security awareness program'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''David Rook - Riot Games - (http://ie.linkedin.com/pub/david-rook/3/41a/b1b) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David Rook is a Security Engineer focusing on Application Security at Riot Games in Dublin. David held various application security roles in the financial services industry since 2006 before moving into the computer games industry in early 2014. He has been a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja.&lt;br /&gt;
 &lt;br /&gt;
David strives to practice what he preaches and has backed up his work experience by developing two open source security code review tools called Agnitio and the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The talk will focus on Riot application security awareness and knowledge sharing in a global company. I will talk about the application security awareness efforts we've implemented this year to bring application security knowledge to software engineers worldwide. These awareness efforts were designed to educate and support engineers around the world who work on high profile web properties and one of the worlds most popular computer games.&lt;br /&gt;
&lt;br /&gt;
I will explain how we've used a combination of traditional and innovative approaches to levelling up our software engineers security knowledge.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Security and how it affects Users and Rioters '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick Security Dude@Riot Games  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a founder of HackEire, a founding member of IrissCert, the first person in Ireland to achieve the GIAC GSE, and has been stoking a passion for security for 14 years.&lt;br /&gt;
 &lt;br /&gt;
Mark leads up the InfoSec team for Riot Games in Europe and is Product Owner of the Security Engineering vertical. Currently he's focused on building a team, engineering cool solutions, levelling the security program, finding the cloud, dealing with DDOS, and trying to earn Silver next year by himself.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The presentation focuses on one of the major security aspects of Android Applications; rooting detection techniques. Many Apps, including (MDM) Mobile Device Management Agents, implements this check in different ways. The aim of the talk is to explore the effectiveness of these checks, with practical examples and explain the impact, in terms of security, of this control being bypassed or not implemented.&lt;br /&gt;
&lt;br /&gt;
A short demo will show the effects of having root permissions on an application when the application thinks you don't.Mark will be discussing his last 18 months at Riot and the increase in attention to security from both a player and Rioter perspective.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP August Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event – Mobile Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Saturday 30th August&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 09:30am &amp;lt;br&amp;gt;Talks Start: 10:00am &amp;lt;br&amp;gt; Event finishes at 6:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-mobile-security-day-30th-august-tickets-12685176705 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking throughout,and pizza thanks to BCC Risk Advisory (http://www.bccriskadvisory.com/) /edgescan (https://www.edgescan.com/)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''“Waving not Drowning” – Secure Mobile Development.'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Eoin Keary - BCC Risk Advisory - (http://ie.linkedin.com/in/eoinkeary) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP board member since 2009. Elected to position of global Vice Chair, September 2011. A long-time member of OWASP. Based in Dublin and director of BCC Risk Advisory Ltd. Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com. He is currently on the global board of the OWASP foundation, he was elected to the board in 2009. During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy.&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this talk Eoin shall discuss aspects of securing mobile apps from a source code standpoint. He shall discuss common pitfalls and associated with developing secure applications, why such issues are important and discuss “war stories” relating to  real-world mobile app [in]security.&lt;br /&gt;
&lt;br /&gt;
This talk is suited to anyone involved in developing, managing development or testing mobile applications for security and robustness.&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Android rooting detection: how and why? '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Giuliano Fasto – Espion – (http://uk.linkedin.com/in/giulianofasto) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Giuliano Fasto is a Security Consultant with more than six years of experience in the IT Security field.  He has worked as a Security Consultant and Penetration Tester for well-respected security companies in Italy, the UK and Ireland.  His academic background includes a BSc in IT Security and an MSc in Information Security and Audit. While he has a wide-ranging experience in penetration testing various systems and technologies, in recent years he has specialised in mobile application security testing, particularly on Android and iOS platforms.  He is currently the lead mobile application tester at Espion.&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The presentation focuses on one of the major security aspects of Android Applications; rooting detection techniques. Many Apps, including (MDM) Mobile Device Management Agents, implements this check in different ways. The aim of the talk is to explore the effectiveness of these checks, with practical examples and explain the impact, in terms of security, of this control being bypassed or not implemented.&lt;br /&gt;
&lt;br /&gt;
A short demo will show the effects of having root permissions on an application when the application thinks you don't.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Bazuc - A talk about new types of attacks and vulnerabilities being exploited  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Cathal McDaid – AdaptiveMobile - (http://ie.linkedin.com/pub/cathal-mc-daid/3/5b2/b77) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cathal Mc Daid is Head of Data intelligence &amp;amp; Analytics in Adaptivemobile, and is responsible for a team dedicated to analysing and uncovering new threats to mobile operators and subscribers, using advanced ‘big data’ techniques. Cathal has 14 years experience in telecoms and wireless. Currently he is also Chairman of the GSMA’s Mobile Malware Group - who coordinates the world's response to mobile malware. His academic background includes a BEng in Computer Engineering from UL and an Executive MBA from INSEAD.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Recent discussions and news about mobile malware primarily talk about new types of attacks and vulnerabilities being exploited. However what do you do when a user knowingly infects his handset for monetary gain?. In this presentation we will discuss a new type of mobile bad-ware, that promised and delivered the user money, in exchange for the renting out of his mobile device for unknown purposes. We discuss the app profile, tactics and impacts - on the users, on the network and on the stock market. &amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' OWASP Security Shepherd project '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Mark denihan &amp;amp; Sean Duggan IBM (http://ie.linkedin.com/in/markdenihan , http://ie.linkedin.com/in/seankduggan ) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is currently working on the IBM Ethical Hacking Team, the OWASP Dublin Board and founded of the OWASP Security Shepherd Project. He got his MSc in Information Security and Digital Forensics in the ITB and a BSc in Computing in the DIT. He also suffers from a love of caffeine and deep paranoia thanks to his extreme security enthusiasm.&lt;br /&gt;
&lt;br /&gt;
Sean has a BSc Computing from Dublin Institute of Technology, currently working in IBM with a passion for Android App Security and Development. He developed an interest in Mobile Application Security after reading about the OWASP Mobile Top Ten Risks in 2012 and has since been keeping up to date with Mobile App Issues. Sean leads the development of the mobile components in the OWASP Security Shepherd project.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skill¬set demographic.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd covers the OWASP Top Ten web app risks and has recently been injected with totally new content to cover the OWASP Top Ten Mobile risks as well. Many of these levels include insufficient mitigations and protections to these risks, such as blacklist filters, atrocious encoding schemes, barbaric security mechanisms and poor security configuration. &lt;br /&gt;
&lt;br /&gt;
The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well. We're going to speak about the platform itself and what it offers someone wishing to teach or learn about mobile and web application security, such as the project’s anti plagiarism mechanisms or it’s flexible approach in presenting its users with lessons and resources.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' CTF'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CTF Using the above OWASP Security Shepherd project. &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
''Please bring a laptop with Zed Attack Proxy/ Burp installed''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Format for the day will be '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
9:30-10.00 -- Registration/ Networking&amp;lt;BR&amp;gt;&lt;br /&gt;
10:00-11:00 -- Speaker 1 50-55mins Talk&amp;lt;BR&amp;gt; &lt;br /&gt;
11:00-12:00 --Speaker 2 50-55mins Talk &amp;lt;BR&amp;gt;&lt;br /&gt;
12:00-1:00 --  Speaker 3 50-55mins Talk &amp;lt;BR&amp;gt;&lt;br /&gt;
1:00-1:50 --Lunch &amp;lt;BR&amp;gt;&lt;br /&gt;
2:00-6:00 -- Mobile Shepherd talk leading into CTF. '''Please bring a laptop with Zed Attack Proxy/ Burp installed''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event (2)===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Matt Johansen Sr. Manager for the Threat Research Center at WhiteHat Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 22nd May&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-may-tickets-11644682559 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to WhiteHat Security - https://www.whitehatsec.com/ &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''*&amp;quot;Top 10 Web Hacks of 2013&amp;quot;*'''&lt;br /&gt;
&lt;br /&gt;
'''Matt Johansen Sr. Manager for the Threat Research Center at WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
Matt Johansen is a Sr. Manager for the Threat Research Center at WhiteHat Security where he manages a team of Application Security Specialists, Engineers and Supervisors to prevent website security attacks and protect companies' and their customers' data. Before this he was an Application Security Engineer where he oversaw and assessed more than 35,000 web applications that WhiteHat has under contract for many Fortune 500 companies across a range of technologies.&lt;br /&gt;
 &lt;br /&gt;
He was previously a security consultant for VerSprite, where he was responsible for performing network and web application penetration tests. Mr. Johansen is also an instructor of Web Application Security at Adelphi University, where he received his Bachelor of Science in Computer Science, and San Jose State University. He has also been utilized by the SANS Institute as an industry expert for certification review.&lt;br /&gt;
 &lt;br /&gt;
List of past talks including videos/slides - http://mattjay.github.io/talks/ (BlackHat, DEFCON, RSA, SXSW, Many BSides, etc.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Every year the security community produces a stunning number of new Web hacking techniques that are published in various white papers, blog posts, magazine articles, mailing list emails, conference presentations, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and their mobile platform equivalents. Beyond individual vulnerabilities with CVE numbers or system compromises, we are solely focused on new and creative methods of Web-based attack. Now in its eighth year, the Top 10 Web Hacking Techniques list encourages information sharing, provides a centralized knowledge base, and recognizes researchers who contribute excellent work.&lt;br /&gt;
 &lt;br /&gt;
In this talk, We will do a technical deep dive and take you through the Top 10 Web Hacks of 2013 as picked by an expert panel of judges.&lt;br /&gt;
 &lt;br /&gt;
This year’s winners are:&lt;br /&gt;
&lt;br /&gt;
1 - Mario Heiderich – Mutation XSS&amp;lt;br&amp;gt;&lt;br /&gt;
2 - Angelo Prado, Neal Harris, Yoel Gluck – BREACH&amp;lt;br&amp;gt;&lt;br /&gt;
3 - Pixel Perfect Timing Attacks with HTML5&amp;lt;br&amp;gt;&lt;br /&gt;
4 - Lucky 13 Attack&amp;lt;br&amp;gt;&lt;br /&gt;
5 - Weaknesses in RC4&amp;lt;br&amp;gt;&lt;br /&gt;
6 - Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval&amp;lt;br&amp;gt;&lt;br /&gt;
7 - Million Browser Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
8 - Large Scale Detection of DOM based XSS&amp;lt;br&amp;gt;&lt;br /&gt;
9 - Tor Hidden-Service Passive De-Cloaking&amp;lt;br&amp;gt;&lt;br /&gt;
10 - HTML5 Hard Disk Filler™ API&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event (1)===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Eoin Kearyof BCC Risk Advisory and Matej Saksida of Realex''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 1st May&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-may-tickets-11354041243 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to BCC Risk Advisory (http://www.bccriskadvisory.com/) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: *&amp;quot;Top 10 defensive Java developer controls&amp;quot;*'''&lt;br /&gt;
&lt;br /&gt;
'''Eoin Keary - BCC Risk Advisory - (http://ie.linkedin.com/in/eoinkeary)'''&lt;br /&gt;
&lt;br /&gt;
OWASP board member since 2009. Elected to position of global Vice Chair, September 2011. A long time member of OWASP. Based in Dublin and director of BCC Risk Advisory Ltd.&lt;br /&gt;
Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com. He is currently on the global board of the OWASP foundation, he was elected to the board in 2009. During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy. &lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
In this talk Eoin shall go through a list of developer controls in order to help prevent common security vulnerabilities such those focused in the&lt;br /&gt;
OWASP Top 10 2013. From input validation to contextual output encoding to crypto-secure storage, Eoin shall call out what developers can do to help&lt;br /&gt;
mitigate such issues. Many of the mitigations are simple and use established API's such that developer need not be security experts and just&lt;br /&gt;
use core components to help improve their security posture.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Talk 2: *&amp;quot;Social Engineering - The Art of Human Hacking&amp;quot;.*'''&lt;br /&gt;
&lt;br /&gt;
'''Matej Saksida - Realex Payments - (http://ie.linkedin.com/pub/matej-saksida-cism/20/412/176)'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Nowadays if you want to hack a corporation or damage a personal &amp;quot;enemy&amp;quot; fast, Social Engineering techniques work every time and more often than not&lt;br /&gt;
it works the first time. In this talk Matej shall go through what is social engineering is, types of social engineering and related threats.&lt;br /&gt;
Matej shall call out practical example how to use Facebook to ruin someone's life and what countermeasures can be used against social engineering attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP March Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Rahim Jina of BCC Risk Advisory and Stephen Scott of Espion''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 13th March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-tickets-10802455435 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to Espion (http://www.espiongroup.com/)&lt;br /&gt;
&lt;br /&gt;
Talk 1: Building a shield of security - Vulnerability Management by the numbers and dumb robots!&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory&lt;br /&gt;
&lt;br /&gt;
Rahim has been an active member of OWASP since 2008 and has contributed to many projects such as the OWASP Security Code Review Guide and is an ex-board member of the Irish Chapter. Previously Rahim was a senior security consultant at a “big 4” professional services firm and more recently, the head of security for Fonality Inc, a VoIP service provider based in Los Angeles. Rahim is currently a director for BCC Risk Advisory (bccriskadvisory.com), based in Dublin, Ireland. He is also responsible for the security architecture of the edgescan.comvulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
This presentation discusses how builders, breakers and defenders should look at vulnerability management when attempting to keep hackers at bay. We discuss the most common vulnerabilities which are not detected by security tools nor automation but nevertheless are common and can be used to commit real fraud resulting in financial loss. We will see that Web Application Firewalls are ineffective against such attacks and why the only practical solution is to apply a layered approach across all aspects of the SDLC.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Talk 2: &amp;quot;PCI's Changing Environment - What You Need to Know &amp;amp; Why You Need To Know It&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stephen Scott - Senior Consultant and PCI QSA in Espion's Information Government practice&lt;br /&gt;
&lt;br /&gt;
Stephen Scott, Consultancy Team lead in Espion, is an experienced information security, risk and compliance consultant whose experience spans across many different areas including, PCI DSS, information security, risk management, group internal audit, IT service management and regulatory compliance. Stephen has extensive experience with information security, internal control testing, compliance programmes, information risk management, and process improvement. Stephen has worked across a wide range of industry verticals, including financial, industrial and insurance.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
PCI DSS – The Payment Card Industry Data Security Standard sets common requirements for securing payment card information (credit, debit, some gift cards), and lays out a range of controls relating to auditing, scanning and assessment.&lt;br /&gt;
&lt;br /&gt;
This presentation discusses the ever evolving PCI environment, specifically focusing on the changes in the recent release of version 3 of the PCI DSS standard.  Stephen will start off by giving a brief background to PCI, including motivators for merchant and service providers to adhere to the standard.  In addition to this, the presentation will highlight what security considerations are relevant to application and information security practitioners.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2013 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP July Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Jeremiah Grossman - Another Year in Web Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 17:30 &amp;lt;br&amp;gt;Talk: 18:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.eventbrite.com/event/7127672059 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Jeremiah Grossman of WhiteHat Security will be in Dublin and will be talking at our next chapter event. His talk &amp;quot;Another Year In Web Security: What did 2012 teach us about survival in the coming years?&amp;quot; promises a great insight into the future of web security.&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, founder and CTO of WhiteHat Security, is a world-renowned expert in web application security and a founding member of the Web Application Security Consortium (WASC). At WhiteHat, Mr. Grossman is responsible for web application security R&amp;amp;D and industry evangelism. He is a frequent speaker at industry events including the BlackHat Briefings, ISACA's Networks Security Conference, NASA, ISSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
A trusted media resource, Mr. Grossman has been featured in USA Today, the Washington Post, Information Week, NBC Nightly News, and many others. Mr. Grossman is also a featured expert and frequent contributor on TechTarget'sSearchAppSecurity.com.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP June Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference. [https://www.owasp.org/index.php/EUTour2013#Dublin Info and registration link for the conference])''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event ===&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''TRAINING &amp;amp; TALKS''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Dublin - Realex Payments Application Security Workshop''' == &lt;br /&gt;
'''Thursday 30th May'''&amp;lt;br&amp;gt; ''('''Training'''. 1:30pm- 5:00pm)'' &amp;lt;br&amp;gt;('''Talks'''. 6:00pm - 8:00pm)''&amp;lt;br&amp;gt;[http://www.eventbrite.com/event/6665658163/eorg Click here for more information]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Training'''&lt;br /&gt;
&lt;br /&gt;
Eoin Keary will be delivering free application security training between 2pm and 5pm on the 30th May. Eoin was the founder of OWASP Ireland and is currently the global vice chair for OWASP (amongst many other things!  https://www.owasp.org/index.php/Eoin_Keary). He has delivered application security training to many developers and security professionals around the world and recently delivered a training course to over 400 people at the RSA Conference.&lt;br /&gt;
&lt;br /&gt;
The training will focus on secure application development and why we can't hack ourselves secure. It will be covering why penetration testing on its own does not work approaches to improvement including &amp;quot;knowing what you don't know&amp;quot; and how to measure change.&lt;br /&gt;
&lt;br /&gt;
It will be technical training covering XSS eradication, client side security and browser DOM curiosities.&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
The talks will be starting at 6pm in our office and OWASP have arranged two very interesting talks! Diarmaid McManus https://twitter.com/elephant_rb from Realex Payments will be expanding his award winning SecurityBSides London Rookie Track talk https://www.securityninja.co.uk/application-security/securitybsides-london-esp-security-plugin/ to include more details about static analysis approaches and his research and development work on ESP: Security Plugin https://github.com/diarmaid-mcmanus/ESPSecurityPlugin.&lt;br /&gt;
&lt;br /&gt;
Hugh Pearse https://twitter.com/hughpearse will be talking about Low Level Exploits and this looks like it will be a great talk:&lt;br /&gt;
&lt;br /&gt;
“In 2010 Mr Haroon Meer from thinkst.com presented a timeline of memory corruption vulnerabilities and their mitigation techniques dating from 1985 to 2010. In his 35 page publication he referenced almost 150 events in low level information security history. The scope of the presentation &amp;quot;Low Level Exploits&amp;quot; is to explain in detail some of the most significant attacks in from Haroon Meers research. The attacks covered in this presentation include buffer overflows on the stack, heap overflows, integer overflows, format strings, null pointers and ROP chains. This brings us to exploits in the present day where researchers are looking for the successor of the buffer overflow attack, next big exploit.”&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2011 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== [[Ireland/Training/OWASP projects and resources you can use TODAY]] ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp logo Ireland Training 11 March 2010.gif]]&lt;br /&gt;
&lt;br /&gt;
*'''Overview &amp;amp; Goal'''&lt;br /&gt;
**Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle. &lt;br /&gt;
**This course aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them. &lt;br /&gt;
**The course will be very practical where demonstration and hands-on exercises will be provided for the tools covered. &lt;br /&gt;
**If you are interested in participating in the hands on portion of the course, please bring a laptop. &lt;br /&gt;
*'''Dates'''&lt;br /&gt;
**March, 2011, 11&lt;br /&gt;
*'''Course Main Content and Registration'''&lt;br /&gt;
**[[Ireland/Training/OWASP projects and resources you can use TODAY|Click here]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dublin2010.gif]]&lt;br /&gt;
&lt;br /&gt;
Click [[OWASP IRELAND 2010]] for more information &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010 Agenda  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== AUG 2010  ====&lt;br /&gt;
== OWASP August Event ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 11/8/2010 6:00pm - 8:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' OWASP ESAPI Swingset: Introduction &amp;amp; Demo by Cathal Courtney&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The ESAPI Swingset is a web application which demonstrates common security vulnerabilities and asks users to secure the application against these vulnerabilities using the ESAPI library. The application is intended for Java Developers. The goal of the application is to teach developers about the functionality of the ESAPI library and give users a practical understanding of how it can be used to protect web applications against common security vulnerabilities. During the talk, Cathal will demonstrate how to install and use ESAPI Swingset in your organization. A copy of the latest version will be also provided to the attendees.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Cathal is an experienced developer working at AIB and is currently the ESAPI Swingset project leader. More information about this project could be found here: [http://www.owasp.org/index.php/ESAPI_Swingset Esapi SwingSet]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' Not available&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' Security Implications for Web Applications based on SOA by John Marmelstein&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The main point of SOA (in this context) is combining systems and applications to make new applications, or a big 'overall' application.This higher inter-operability does (by default) lower security. For a start, a request originating from a web user might end up at several back end systems, which do not know who or what the request came from.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each back end system might have no access to the customer data, have a different security models, and serve serveral front end. Each of the above systems could be under different ownership, thus the owners have different concerns and priorities. Also, the basic solution at a technical level include single sign on, or security as a service. This can be costly, give limited coverage and have a performance hit. But is pretty much the only way to do it. The other thing to do (probably in tandem) is strict management, and delegation of authority.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John has about 13 years in IT. Most of this in distributed systems and 'Middleware' integration software. Including BEA (now owned by Oracle). Mainly working on Enterprise Java and more recently on Microsoft BizTalk. Various industries, incuding financials, public services, and a fish farm.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== SEP 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND 2010  ==&lt;br /&gt;
&lt;br /&gt;
Due to popular demand we are hosting the 2nd OWASP IRELAND event, '''OWASP Ireland 2010'''. &amp;lt;br&amp;gt;Continuing last years highly successful conference, with more than 150 attendees from across the globe OWASP is happy to repeat this positive experience. &amp;lt;br&amp;gt;Delegates from numerous industry verticals attended the 2009 event; from government to finance to telecoms. Share your thoughts at this open event with some of the most experienced individuals in the information security industry. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_IRELAND_2010 [[Image:Dublin2010.gif]]]&amp;lt;br&amp;gt;[[OWASP_IRELAND_2010]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' '''September 17th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Trinity College Dublin, The Hamilton Building &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [[Eoin Keary|Eoin Keary]]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Subscribe to the OWASP Ireland [https://lists.owasp.org/mailman/listinfo/owasp-ireland mail list] for the up-to-date information.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OCT 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== NOV 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== DEC 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 2010 Chapter Plan  ====&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Educational Outreach&amp;lt;br&amp;gt;Summary: Drive education awareness of OWASP among Irish Universities and Third Level Institutions. &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Fabio Cerullo &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Industry Outreach&amp;lt;br&amp;gt;Summary: Raise awareness of OWASP among Irish industry.&amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Eoin Keary&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Membership Drive &amp;lt;br&amp;gt;Summary: Increase local chapter members individuals and corporate supporters &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Project Participants: Rahim Jina&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Hands-On Training&amp;lt;br&amp;gt;Summary: Provide 1-day, 3-day and 5-day hands-on classroom / online training classes&amp;lt;br&amp;gt;Next Milestone: Organize Training Offerings&amp;lt;br&amp;gt;Project Participants: Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Call For Presentations for 2010 is now open - please contact fcerullo(@)owasp.org / +353877817468 if you would like to speak or can host a meeting. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;*Note meeting hosts are provided with annual chapter sponsorship and free seats in training classes. The OWASP Foundation, Ireland chapter focuses on implementation of efforts defined by the [http://www.owasp.org/index.php/Global_Committee_Pages Global Committee] as well as new concepts and ideas defined locally. Below are a list of ACTIVE projects assigned to individual active members and teams within the local chapter. If you would like to help out on ANY of these efforts, contact them directly to get involved &lt;br /&gt;
&lt;br /&gt;
==== FEB 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Event - What is the O2 Platform?  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 19/2/2010 3:00pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP O2 Platform - Open Platform for automating application security knowledge and workflows &amp;lt;br&amp;gt;'''Abstract:''' In this talk Dinis Cruz will show the OWASP O2 Platform which is an open source toolkit specifically designed for developers and security consultants to be able to perform quick, effective and thorough 'source-code-driven' application security reviews. The OWASP O2 Platform (http://www.owasp.org/index.php/OWASP_O2_Platform) consumes results from the scanning engines from Ounce Labs, Microsoft's CAT.NET tool, FindBugs, CodeCrawler and AppScan DE, and also provides limited support for Fortify and OWASP WebScarab dumps. In the past, there has been a very healthy skepticism on the usability of Source Code analysis engines to find commonly found vulnerablities in real world applications. This presentation will show that with some creative and powerful tools, it IS possible to use O2 to discover those issues. This presentation will also show O2's advanced support for Struts and Spring MVC. &lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development. For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences. At OWASP, Dinis is the leader of the [[OWASP O2 Platform]] project, member of the OWASP [[Global Projects Committee]], chair of the [[OWASP Connections Committee]] and member of the [[About The Open Web Application Security Project#Global_Board_Members|OWASP Board]]. &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' http://www.o2-ounceopen.com/files-binaries-source-and-demo/old-documents-and-presentations/OWASP_O2_Platform_-_AppSec_Ireland_Sep_2009.pdf &lt;br /&gt;
&lt;br /&gt;
== IISF/OWASP – February Chapter Meeting  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 25/2/2010 2:00pm - 4:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Georgian Suite, Buswells Hotel, Molesworth St., Dublin 2 &lt;br /&gt;
&lt;br /&gt;
'''Title:''' An overview of Web Application Security threats and technologies. Practical advice and techniques for improving Application Security, presented by OWASP. &lt;br /&gt;
&lt;br /&gt;
2:00 - Introduction by IISF Chairman &lt;br /&gt;
&lt;br /&gt;
2:05 - Presentation&amp;amp;nbsp;: “Practical advice for improving Application Security” - Introduction to OWASP and OWASP Top Ten - Demonstration video of typical web based attacks with high level explanation - Live SQL injection demo using WebGoat &amp;amp;amp; WebScarab - Live Cross Site Scripting demo using WebGoat &amp;amp;amp; WebScarab &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part1.ppt]] &lt;br /&gt;
&lt;br /&gt;
3:00 - Coffee &lt;br /&gt;
&lt;br /&gt;
3:20 – Presentation continues - Application Security: &amp;quot;The problems we are faced with&amp;quot; - The Application Security Verification Standard - SDLC &amp;amp;amp; Security Assurance Maturity Model - Code Review versus traditional Runtime Testing. - Q&amp;amp;amp;A &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part2.pptx]] &lt;br /&gt;
&lt;br /&gt;
4:00 - Close of Meeting &lt;br /&gt;
&lt;br /&gt;
4:05 - Traditional networking in Buswells Bar &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP - 26/3/2010  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== APR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Live CD - An open environment for Web Application Security  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 16/4/2010 2:30pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP Live CD - An open environment for Web Application Security &amp;lt;br&amp;gt;'''Abstract:''' This CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. This presentation aims to provide a showcase for the great OWASP tools and documentation materials available in the CD, tips and tricks, and also some introductory stuff regarding code review and penetration testing. &amp;lt;br&amp;gt;Training is aimed at introductory /intermediate level in terms of pen testing, code review and tools. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Rahim Jina''' &amp;lt;br&amp;gt;Rahim Jina currently works as a senior consultant for Ernst &amp;amp;amp; Young's Risk Advisory Services in Dublin. He has worked there for nearly four years primarily delivering penetration testing services to clients globally, focusing on web applications and secure code review. He has been involved with OWASP for the past two years, being involved in the Summer of Code 2008 as lead reviewer for the Code Review Guide 2009. He has also made contributions to the SAMM project (OpenSAMM). He holds an MSC in Security and Forensic Computing from DCU and a degree in computer science from Trinity college. &amp;lt;br&amp;gt;'''Eoin Keary''' &amp;lt;br&amp;gt;Eoin is a long time member of OWASP and have contributed year on year to OWASP projects and the OWASP mission of fighting the causes of software insecurity. He is based in Dublin, Ireland and run the Ernst &amp;amp;amp; Young application security team across Europe. His OWASP contributions to date include the OWASP Code Review Guide, OWASP Testing Guide, OWASP SAMM, and OWASP ASVS. He is a member of the OWASP Global Industry Committee, chair of the OWASP Conferences Committee and member of the OWASP Global Board. Eoin founded the OWASP Ireland chapter back in 2004 and currently serves as Vice President of the OWASP Ireland Board. &lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/d/db/P1040923_1024.JPG [[Image:|P1040923_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/d/db/P1040923_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/f/f3/P1040927_1024.JPG [[Image:|P1040927_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/f/f3/P1040927_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/6/64/P1040929_1024.JPG [[Image:|P1040929_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/6/64/P1040929_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
'''Download Presentation:''' [http://www.owasp.org/images/e/ee/OWASP_Live_CD.pptx [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After OWASP Live CD training &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAY 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Trials &amp;amp;amp; Tribulations of WAF Implementation  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Trials &amp;amp;amp; Tribulations of WAF Implementation&amp;lt;br&amp;gt;'''Abstract:''' A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&amp;lt;br&amp;gt;Mark will be presenting on his experience in implementing a Web Application Firewall solution through all phases from research to implementation. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick - Application Networking Team, Citrix Systems''' &amp;lt;br&amp;gt;Mark Hillick has 10 years experience in relation to Internet, networking, systems administration and security engineering. &lt;br /&gt;
&lt;br /&gt;
Mark graduated from Queen's University, where he studied Mathematics. &lt;br /&gt;
&lt;br /&gt;
Mark joined AIB from Queen's where he joined the Internet Infrastructure team, where he was responsible for designing, building and securing the Internet service in and out of AIB. He is a prominent member of the IT Security community in Ireland and has presented at several local security forums such as IISF and Owasp. Mark is one of the founding members of IRISS CERT, where he is also a Volunteer Incident Handler. He helped organise IRISSCon 2009, where he also designed and built HackEire 2009, the first Ethical Hacking 'Capture The Flag' contest in Ireland.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[Image:20052010017.jpg|thumb|A caption from Mark's talk]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [http://docs.google.com/fileview?id=0B3vrVYEosFeEZDMyZjIzYTktMzNkZC00ZjBlLWFiYTgtNThjZGE4YTE1NmFj [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After WAF presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUN 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Define Security Requirements - A practical approach  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Define Security Requirements - A practical approach&amp;lt;br&amp;gt;'''Abstract:''' The Data Protection Act states that &amp;quot;appropriate security measures&amp;quot; must be taken to protect personal data. How do you specify the appropriate security measures for a website which processes personal data? It is an important step in a development project, but is often neglected. In this talk, Alexis will descibe his own experiences of assessing web application, and will also look in more detail at what the Data Protection Commissioner says. He will then take a fictional website and look at a practical approach to specifying the security requirements that the fictional application should meet. This will use the kind of risk-based techniques outlined by OWASP or the Microsoft Secure Development Lifecycle (SDL). Issues discussed will include encryption, authentication, access control, audit, etc. The result will be a list of security requirements that can be carried into the design and development phases. Attendees should be able to apply the ideas to their own development projects. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Alexis Fitzgerald - Rits Information Security Group''' &amp;lt;br&amp;gt;For the last six years Alexis has worked for Rits Information Security Group, where he performs application penetration testing assignments as well as advising clients on application security issues. Before that, he spent many years as a developer (mainly in the financial sector), and he continues to be involved in development. Alexis holds an MSc in Information Security from the University of London, Royal Holloway.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:OWASP Ireland June10.pdf]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After Alexis presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUL 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Ireland]]&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_INtro_to_GDPR_1603.ppt&amp;diff=212268</id>
		<title>File:OWASP INtro to GDPR 1603.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_INtro_to_GDPR_1603.ppt&amp;diff=212268"/>
				<updated>2016-04-01T12:16:33Z</updated>
		
		<summary type="html">&lt;p&gt;Owen Pendlebury: Hugh Jones - OWASP Dublin Chapter Meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hugh Jones - OWASP Dublin Chapter Meeting&lt;/div&gt;</summary>
		<author><name>Owen Pendlebury</name></author>	</entry>

	</feed>