<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Providesecurity</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Providesecurity"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Providesecurity"/>
		<updated>2026-05-09T08:43:01Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internship_Program&amp;diff=82187</id>
		<title>OWASP Internship Program</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internship_Program&amp;diff=82187"/>
				<updated>2010-04-21T22:40:04Z</updated>
		
		<summary type="html">&lt;p&gt;Providesecurity: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Stay tuned for information and program details on the OWASP Internship Program.'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A key component to the overall success of OWASP’s mission is the ability to positively affect change and induce an atmosphere that is conducive for knowledge share and learning.  &lt;br /&gt;
&lt;br /&gt;
To further the mission of the Educational Project, OWASP desires to help better prepare the future workforce when making the transition from student to employee.  Therefore, we have developed this Internship program.  The goal of this program is to act as a bridge between the corporate and educational communities.   &lt;br /&gt;
&lt;br /&gt;
The benefits of participation for all involved are obvious.  The Corporate Sponsors get a pipeline to future workers.  Educational Sponsors further their mission by helping students better prepare for the real world.  OWASP and the IT Security community benefit with the realization of our mission to make application security more visible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are a corporate or educational organization and would like to participate in the program, please contact Peter Dean at peter.dean(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Organizations looking for interns;'''&lt;br /&gt;
&lt;br /&gt;
'''Provide Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Programmer / Information Security - PAID INTERNSHIP&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Job Description'''&amp;lt;br&amp;gt;&lt;br /&gt;
Provide Security is a leading security firm providing their clients with the best of both cyber and physical security needs. We currently have a paid internship available for a part-time Programmer with a passion for INFOSEC for our New Jersey Offfice. The ideal candidate should be a detail oriented, self-motivated, career focused team player with a desire to work in a growing small to medium sized company.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Responsibilities:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Program and maintain database-driven applications, troubleshoot web-related issues, perform general web site maintenance and web tasks as needed. In addition, you will assist on Red Team Assessments, site surveys, and other exciting security ventures.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Required Skills'''&amp;lt;br&amp;gt;&lt;br /&gt;
Experience We Are Looking For:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
• Experience creating database-driven applications using some of the following web programming technologies: PHP, ASP, ASP.NET, Coldfusion, XML, Flash / Actionscript, MySQL, MS SQL Server, JavaScript, CSS, and HTML.&amp;lt;br&amp;gt;&lt;br /&gt;
• PHP &amp;amp; ASP.NET required&amp;lt;br&amp;gt;&lt;br /&gt;
• Computer Science Major&amp;lt;br&amp;gt;&lt;br /&gt;
• Knowledge of mobile application development A PLUS&amp;lt;br&amp;gt;&lt;br /&gt;
• Knowledge of Application Security a plus&amp;lt;br&amp;gt;&lt;br /&gt;
• Desire to learn about Physical Security and Penetration Testing&amp;lt;br&amp;gt;&lt;br /&gt;
• Must be a team player and able/willing to write code to conform to company development standards.&amp;lt;br&amp;gt;&lt;br /&gt;
• Performs well under pressure&amp;lt;br&amp;gt;&lt;br /&gt;
• Understand the importance of meeting customer expectations&amp;lt;br&amp;gt;&lt;br /&gt;
• Friendly &amp;amp; Flexible&amp;lt;br&amp;gt;&lt;br /&gt;
• Attention To Detail is a MUST!&amp;lt;br&amp;gt;&lt;br /&gt;
• Fast worker and communicator&amp;lt;br&amp;gt;&lt;br /&gt;
• Overall great attitude&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We Offer: &amp;lt;br&amp;gt;&lt;br /&gt;
• Paid Internship&amp;lt;br&amp;gt;&lt;br /&gt;
• College Credit&amp;lt;br&amp;gt;&lt;br /&gt;
• Experience&amp;lt;br&amp;gt;&lt;br /&gt;
• A Letter of Recommendation&amp;lt;br&amp;gt;&lt;br /&gt;
• Possibility Of Full-Time Job&amp;lt;br&amp;gt;&lt;br /&gt;
• Fun, growing, friendly, fast-paced environment&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Contact Information&amp;lt;br&amp;gt;&lt;br /&gt;
--------------------&amp;lt;br&amp;gt;&lt;br /&gt;
'''Provide Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.providesecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
Thomas Ryan&amp;lt;br&amp;gt;&lt;br /&gt;
Managing Partner&amp;lt;br&amp;gt;&lt;br /&gt;
phone: +1(732)207-7916&amp;lt;br&amp;gt;&lt;br /&gt;
e-mail: tom.ryan(at)providesecurity.com&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Educational Sponsors'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Rutgers University'''&amp;lt;br&amp;gt;&lt;br /&gt;
The link below will direct you to the Rutgers Career Services website.  The specifics of the Rutgers internship program can be found here.&amp;lt;br&amp;gt;&lt;br /&gt;
http://careerservices.rutgers.edu/&lt;/div&gt;</summary>
		<author><name>Providesecurity</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Internship_Program&amp;diff=82186</id>
		<title>OWASP Internship Program</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Internship_Program&amp;diff=82186"/>
				<updated>2010-04-21T22:34:30Z</updated>
		
		<summary type="html">&lt;p&gt;Providesecurity: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Stay tuned for information and program details on the OWASP Internship Program.'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A key component to the overall success of OWASP’s mission is the ability to positively affect change and induce an atmosphere that is conducive for knowledge share and learning.  &lt;br /&gt;
&lt;br /&gt;
To further the mission of the Educational Project, OWASP desires to help better prepare the future workforce when making the transition from student to employee.  Therefore, we have developed this Internship program.  The goal of this program is to act as a bridge between the corporate and educational communities.   &lt;br /&gt;
&lt;br /&gt;
The benefits of participation for all involved are obvious.  The Corporate Sponsors get a pipeline to future workers.  Educational Sponsors further their mission by helping students better prepare for the real world.  OWASP and the IT Security community benefit with the realization of our mission to make application security more visible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are a corporate or educational organization and would like to participate in the program, please contact Peter Dean at peter.dean(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Organizations looking for interns;'''&lt;br /&gt;
&lt;br /&gt;
'''Provide Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Programmer / Information Security - INTERN&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Job Description'''&amp;lt;br&amp;gt;&lt;br /&gt;
Provide Security is a leading security firm providing their clients with the best of both cyber and physical security needs. We currently have a paid internship available for a part-time Programmer with a passion for INFOSEC for our New Jersey Offfice. The ideal candidate should be a detail oriented, self-motivated, career focused team player with a desire to work in a growing small to medium sized company.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Responsibilities:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Program and maintain database-driven applications, troubleshoot web-related issues, perform general web site maintenance and web tasks as needed. In addition, you will assist on Red Team Assessments, site surveys, and other exciting security ventures.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Required Skills'''&amp;lt;br&amp;gt;&lt;br /&gt;
Experience We Are Looking For:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
• Experience creating database-driven applications using some of the following web programming technologies: PHP, ASP, ASP.NET, Coldfusion, XML, Flash / Actionscript, MySQL, MS SQL Server, JavaScript, CSS, and HTML.&amp;lt;br&amp;gt;&lt;br /&gt;
• PHP &amp;amp; ASP.NET required&amp;lt;br&amp;gt;&lt;br /&gt;
• Computer Science Major&amp;lt;br&amp;gt;&lt;br /&gt;
• Knowledge of mobile application development A PLUS&amp;lt;br&amp;gt;&lt;br /&gt;
• Knowledge of Application Security a plus&amp;lt;br&amp;gt;&lt;br /&gt;
• Desire to learn about Physical Security and Penetration Testing&amp;lt;br&amp;gt;&lt;br /&gt;
• Must be a team player and able/willing to write code to conform to company development standards.&amp;lt;br&amp;gt;&lt;br /&gt;
• Performs well under pressure&amp;lt;br&amp;gt;&lt;br /&gt;
• Understand the importance of meeting customer expectations&amp;lt;br&amp;gt;&lt;br /&gt;
• Friendly &amp;amp; Flexible&amp;lt;br&amp;gt;&lt;br /&gt;
• Attention To Detail is a MUST!&amp;lt;br&amp;gt;&lt;br /&gt;
• Fast worker and communicator&amp;lt;br&amp;gt;&lt;br /&gt;
• Overall great attitude&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We Offer: &amp;lt;br&amp;gt;&lt;br /&gt;
• Paid Internship&amp;lt;br&amp;gt;&lt;br /&gt;
• College Credit&amp;lt;br&amp;gt;&lt;br /&gt;
• Experience&amp;lt;br&amp;gt;&lt;br /&gt;
• A Letter of Recommendation&amp;lt;br&amp;gt;&lt;br /&gt;
• Possibility Of Full-Time Job&amp;lt;br&amp;gt;&lt;br /&gt;
• Fun, growing, friendly, fast-paced environment&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Contact Information&amp;lt;br&amp;gt;&lt;br /&gt;
--------------------&amp;lt;br&amp;gt;&lt;br /&gt;
'''Provide Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.providesecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
Thomas Ryan&amp;lt;br&amp;gt;&lt;br /&gt;
Managing Partner&amp;lt;br&amp;gt;&lt;br /&gt;
phone: +1(732)207-7916&amp;lt;br&amp;gt;&lt;br /&gt;
e-mail: tom.ryan@providesecurity.com&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Educational Sponsors'''&lt;br /&gt;
&lt;br /&gt;
'''Rutgers University'''&amp;lt;br&amp;gt;&lt;br /&gt;
The link below will direct you to the Rutgers Career Services website.  The specifics of the Rutgers internship program can be found here.&amp;lt;br&amp;gt;&lt;br /&gt;
http://careerservices.rutgers.edu/&lt;/div&gt;</summary>
		<author><name>Providesecurity</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=64917</id>
		<title>Category:OWASP CSA Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CSA_Project&amp;diff=64917"/>
				<updated>2009-06-25T18:24:33Z</updated>
		
		<summary type="html">&lt;p&gt;Providesecurity: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last Updated: 6/25/2009&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mission of CSA_Project Collective&amp;lt;/b&amp;gt;&lt;br /&gt;
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing&lt;br /&gt;
&lt;br /&gt;
Primary Project Website: [http://www.cloudsecurityalliance.org http://www.cloudsecurityalliance.org]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Project leaders: Warren Axelrod &amp;amp; Michael Sutton &lt;br /&gt;
&lt;br /&gt;
Version 1.0 Document: [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Get it Now] and [http://cloudsecurityalliance.org/guidance Additional CSA resources]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;&amp;lt;center&amp;gt;&amp;lt;b&amp;gt; Deadline for RFC July 8th 2009 &amp;lt;/b&amp;gt;&amp;lt;/center&amp;gt;&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you would like to contribute to this effort as a OWASP voice of Industry/Projects you can and its VERY simple to get started.&lt;br /&gt;
&lt;br /&gt;
Step #1 - Review V1.0 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
Step #2 - Condense your written comments, references for improvement and suggestions and review/post them to the WIKI - http://www.owasp.org/index.php/Category:OWASP_CSA_Project.  This location will be monitored by CSA for inclusion into Version 2.0&lt;br /&gt;
&lt;br /&gt;
Step #3 - Add your name to the wiki page if you would like to work on this effort. The goal is to utilize the experts at OWASP to review and comment as a collective group and reference OWASP existing materials to help the CSA effort and to raise awareness to others about OWASP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;lt;u&amp;gt;Name/eMail/Phone&amp;lt;/u&amp;gt;&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tom Brennan/tomb(at)owasp.org/9732020122&lt;br /&gt;
&lt;br /&gt;
Michael Coates/michael.coates(at)owasp.org/6302072567&lt;br /&gt;
&lt;br /&gt;
Thomas Ryan/thomas.ryan(at)owasp.org/7322077916&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Comments on the Domain 11: Application Security  Page 65-71   (not limited to that domain BTW)&lt;br /&gt;
&amp;lt;table border=1&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
Page #&amp;lt;/td&amp;gt;                 &amp;lt;td&amp;gt;  Comment  &amp;lt;/td&amp;gt;                &amp;lt;td&amp;gt;  Your Name &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;72&amp;lt;/td&amp;gt;  &amp;lt;td&amp;gt;The second sentence of the Issuance and Guidance on page 72 is misleading and factually incorrect. &amp;quot;Encrypted data is intrinsically protected; if someone has the data without its corresponding keys, they cannot use the data at all.&amp;quot; Encrypting data will guarantee that the data is not viewed or modified by a party that does not possess the corresponding keys. However, encrypted data can be used in reply attacks. As such, it is imperative that the transfer of encrypted data utzilize secure tokens and timestamps to ensure the transmission is not subject to replay attacks.  The use of SSL/TLS for data transmission will provide both encryption of data and protection against replay attacks.&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;Michael Coates&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;page#&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Comment Here &amp;lt;/td&amp;gt;&amp;lt;td&amp;gt; Name here &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Providesecurity</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=35994</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=35994"/>
				<updated>2008-08-13T23:56:07Z</updated>
		
		<summary type="html">&lt;p&gt;Providesecurity: /* 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt; Scroll down to see speaker agenda, and training options &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] - [http://www.cenzic.com/ https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] ~ [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 Members / $400 Non-Members / $200 for Students.  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008 &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Doors Open for Attendee/Speaker Registration &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#Technology_Pavilion_-_September_24th_and_25th Exhibit/Sponsor Area]'''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, where we are.. where we are going &lt;br /&gt;
''[http://www.owasp.org/index.php/Contact OWASP Foundation]: Jeff Williams, Dinis Cruz, Dave Wichers, Tom Brennan, Sebastien Deleersnyder, Paulo Coimbra, Kate Hartmann, Alison Shrader &amp;amp; all local chapter leaders&lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''Nishchal Bhalla''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.thinkingstone.com/about/ivan-ristic.html Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Critical exploits... let us count the ways&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen],''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Reverse Engineering .NET &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs&lt;br /&gt;
[http://www.linkedin.com/in/mahidontamsetti Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Wild_Wild_Web_on_Security_Planet Wild Wild Web on Security Planet]&lt;br /&gt;
''[http://www.securisksolutions.com/company/execmgt.aspx Mano Paul]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |Shhhh Don’t Tell Anybody &lt;br /&gt;
''[http://www.linkedin.com/in/ppetkov Petko D. Petkov]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af - A Framework to own the web]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar Dr. B. V. Kumar] &amp;amp; [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav Mr. Abhay Bhargav]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP NYC AppSec 2008 VIP Party&lt;br /&gt;
''Location: TBD''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008 &lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | State of the Union&lt;br /&gt;
''[http://www.aeispeakers.com/speakerbio.php?SpeakerID=1192 Prof. Howard A. Schmidt, CISSP, CISM (Hon.)] Current (ISC)² Security Strategist and Former White House Cyber Security Advisor''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls Best Practices Guide: Web Application Firewalls]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' &amp;amp; ''[http://www.linkedin.com/in/steveantoniewicz Steve Antoniewicz]''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html APPSEC Red/Tiger Team Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Update &lt;br /&gt;
''Dinis Cruz/Jeff Williams + Surprise Guest''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Help Wanted 7 Things You Need to Know APPSEC/INFOSEC Employment&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | APPSEC Analyst w/ Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security Research Report&lt;br /&gt;
''[http://www.linkedin.com/pub/5/742/233 Dinis Cruz]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project Pantera Advances]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/598/855 Simon Roses Femerling]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Lotus Notes Insecurity &lt;br /&gt;
''Jian Hui Wang''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Owasp Orizon]&lt;br /&gt;
''Paolo Perego''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Building_Usable_Security Building Usable Security]&lt;br /&gt;
[http://www.owasp.org/index.php/Zed_Abbadi Zed Abbadi]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Input_validation:_the_Good%2C_the_Bad_and_the_Ugly Input validation: the Good, the Bad and the Ugly]&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''Vadim Okun''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Wizdom of Crowds / CTF Awards &amp;amp; Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th. 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Conlultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotels in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Providesecurity</name></author>	</entry>

	</feed>