<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rip</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rip"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rip"/>
		<updated>2026-05-02T18:46:31Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=233421</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=233421"/>
				<updated>2017-09-18T14:20:49Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
* Wang Jie (Participant)&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web application servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=233420</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=233420"/>
				<updated>2017-09-18T14:15:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* Presentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
* Wang Jie (Participant)&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
Any interests of the project, please feel free to contact:&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:Gulingzhi@owasp.org.cn Gu lingzhi]'''&lt;br /&gt;
* '''[mailto:xtz@seczone.cn Xia Tianze]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web application servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=233419</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=233419"/>
				<updated>2017-09-18T14:14:48Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* How can I participate in your project? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:Gulingzhi@owasp.org.cn Lingzhi Gu]'''&lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* Kevin (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
* Wang Jie (Participant)&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
Any interests of the project, please feel free to contact:&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:Gulingzhi@owasp.org.cn Gu lingzhi]'''&lt;br /&gt;
* '''[mailto:xtz@seczone.cn Xia Tianze]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web application servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=233418</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=233418"/>
				<updated>2017-09-18T14:13:44Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Secure Software Development Lifecycle Project(S-SDLC)==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.--&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Its aim is to define a standard Secure Software Development Life Cycle and then help developers to know what should be considered or best practices at each phase of a development Life Cycle (e.g. Design Phase/Coding Phase/Maintain Phase/etc.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Software security has now become a wider concept other than network security. &lt;br /&gt;
There is a developing common sense that creating secured enough software is not just about individual skills but also or even more on work flows-- Software Development Life Cycle. To achieve security requires to be involved in every phase of a Secure Software Development Life Cycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project(S-SDLC) defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The project’s final goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project defines security software development process as well as guides, tools, checklists and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The delivery will contain(not final):&lt;br /&gt;
&lt;br /&gt;
•	Introduction: S-SDLC frame&lt;br /&gt;
&lt;br /&gt;
•	Training guideline: Providing Security Training System&lt;br /&gt;
&lt;br /&gt;
•	Requirements Phase: Risk Evaluation Guideline, and Requirements Criteria Doc.&lt;br /&gt;
&lt;br /&gt;
•	Design Phase: Security Design Review Guideline and Threat Modeling Guideline.&lt;br /&gt;
&lt;br /&gt;
•	Implement Phase: Security Coding Guide(C/C++、JAVA、PHP，C#)&lt;br /&gt;
&lt;br /&gt;
•	Validation Phase: Actives level, Security Testing Guideline&lt;br /&gt;
&lt;br /&gt;
•	Release/maintenance Phase: Vulnerability Management and Incident Response Guideline&lt;br /&gt;
&lt;br /&gt;
Detail information is in below table of content:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Silver Zhang&lt;br /&gt;
&lt;br /&gt;
kevin&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|kevin&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training &lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
BaiDu,Inc&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Secure Software Development Lifecycle Project are free to use. In fact it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important? --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Life Cycle Project is an overall security software methodology for Web and APP developers. &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to help users to reduce security issues, and raise the overall security level from every stage by using the methodology.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you can link to slide presentations related to your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]''' &lt;br /&gt;
* '''[mailto:Gulingzhi@owasp.org.cn Lingzhi Gu]'''&lt;br /&gt;
* '''[mailto:xtz@seczone.cn Tianze Xia]'''&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--This is where you can link to other OWASP Projects that are similar to yours. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- 	This is where you can link to your repository.  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!-- This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	This is where you place links to where your project product can be downloaded or purchased, in the case of a book.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--This project can be purchased as a print on demand book from Lulu.com  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To be updated...&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'  --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.   --&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Software Development Lifecycle Project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:silver@owasp.org.cn Silver Zhang]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Gulingzhi@owasp.org.cn Gu lingzhi]''' (Sub-project Owner)&lt;br /&gt;
* '''[mailto:sky@owasp.org.cn Xia Tianze]''' (Sub-project Owner)&lt;br /&gt;
* ''' [mailto:yukan@owasp.org.cn Yu Kan]'''(Sub-project Owner)&lt;br /&gt;
* '''[mailto:Lance@owasp.org.cn Lance Li]''' (Sub-project Owner)&lt;br /&gt;
* Bao Yuezhong (Participant)&lt;br /&gt;
* Ricky Xu (Participant)&lt;br /&gt;
* Wang Jie (Participant)&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&amp;lt;!--	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.  --&amp;gt;&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Base on the current estimation, the roadmap of the OWASP Secure Software Development Life Cycle Project is below:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
!Sub-Project Name&lt;br /&gt;
!Purpose&lt;br /&gt;
!RoadMap&lt;br /&gt;
!Sub-Porject Owner and Participant&lt;br /&gt;
!Output and Delivery&lt;br /&gt;
!Ref&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Project&lt;br /&gt;
|OWASP Secure Software Development Life Cycle Project defines security software development process. This part of the project is an overview of the life cycle.&lt;br /&gt;
|2017Q3&lt;br /&gt;
|Project Owner：&lt;br /&gt;
&lt;br /&gt;
RIP&lt;br /&gt;
&lt;br /&gt;
Lingzhi Gu&lt;br /&gt;
&lt;br /&gt;
Yuezhong Bao&lt;br /&gt;
&lt;br /&gt;
Tianze Xia&lt;br /&gt;
&lt;br /&gt;
Project Manager：&lt;br /&gt;
&lt;br /&gt;
XuFei&lt;br /&gt;
|OWASP S-SDLC Project Introduction  Doc and Slides&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Overall Flow&lt;br /&gt;
|This part of the OWASP S-SDLC Project defines phases of the life cycle and give suggestions and best practices of adoption.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lingzhi Gu&lt;br /&gt;
&lt;br /&gt;
Peter Xiao&lt;br /&gt;
|Best Practices of S-SDLC in Enterprises &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|OWASP  S-SDLC Security Awareness Training&lt;br /&gt;
|This part provides guidelines of security awareness trainings. These trainings are to enhance the sensitivity of security of software developers.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Jie Wang&lt;br /&gt;
|(1)Training slides&lt;br /&gt;
(2)Training Videos&lt;br /&gt;
&lt;br /&gt;
(3)Examples  of examination questions&lt;br /&gt;
|(1)OWASP TOP 10&lt;br /&gt;
&lt;br /&gt;
(2)OWASP MOBILE TOP 10&lt;br /&gt;
&lt;br /&gt;
(3)OWASP IoT TOP 10&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Requirement&lt;br /&gt;
|This part of OWASP S-SDLC aims to acquire security requirements by identifying the functional implementation, position in industry or  general  security requirements (eg, compliance requirements).&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Requirement&lt;br /&gt;
&lt;br /&gt;
(2)Security Requirement Checklist&lt;br /&gt;
|OWASP Cheat Sheet Series&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Design&lt;br /&gt;
|This part of S-SDLC will guide to deliver a doable security design to the implementation team by considering potential technical security risks. So that by avoiding the early detections of security risks, the cost to build secure products is in control.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Lance Li&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Design&lt;br /&gt;
&lt;br /&gt;
(2)Benchmark of OWASP security baseline&lt;br /&gt;
&lt;br /&gt;
(3)Threat Modeling Guide&lt;br /&gt;
&lt;br /&gt;
(4)Security Guideline for Common Components &lt;br /&gt;
|(1)Application Threat Modeling&lt;br /&gt;
&lt;br /&gt;
(2)OWASP ESAPI&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Implementation&lt;br /&gt;
|The goal of this sub-project of OWASP S-SDLC are to:&lt;br /&gt;
&lt;br /&gt;
(1) Let implementation teams do secure coding. The key is to let team understand security features of the language and framework they use, and obey the output of the S-SDLC security design&lt;br /&gt;
&lt;br /&gt;
(2) Let implementation teams  identify and fix defects in legacy codes. The key is to adopt automated, efficient tech (eg. IAST) by providing guidelines and best practices.&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|&lt;br /&gt;
Kan Yu&lt;br /&gt;
&lt;br /&gt;
Ricky&lt;br /&gt;
&lt;br /&gt;
|(1)Best Practices of S-SDLC Security Implementation&lt;br /&gt;
&lt;br /&gt;
(2)Security Sriteria Checking Tool Sets for  Coding  &lt;br /&gt;
&lt;br /&gt;
(3)Guideline for OWASP Code Review&lt;br /&gt;
|(1)OWASP Code Review Guide Project&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat Sheet Series&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Test&lt;br /&gt;
|Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended&lt;br /&gt;
&lt;br /&gt;
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.&lt;br /&gt;
&lt;br /&gt;
This part of the OWASP S-SDLC project will provide some best practice and useful tips of security testing to help a.) Beginners can start security test easily; b.) Professionals can use for reference.&lt;br /&gt;
&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|Tianze Xia&lt;br /&gt;
|(1)Best Practice of S-SDLC security testing &lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3) Best Practice of OWASP ASVS &lt;br /&gt;
|(1)OWASP testing Guide&lt;br /&gt;
&lt;br /&gt;
(2)OWASP Cheat sheet&lt;br /&gt;
&lt;br /&gt;
(3)OWASP Application Security Verification Standard Project (ASVS)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|OWASP S-SDLC Security Deployment &amp;amp; SecDevOps&lt;br /&gt;
|In this phase of the S-SDLC focus on security auditing before deployment and  security monitoring. The sub-project will research on&lt;br /&gt;
&lt;br /&gt;
(1) develop a appropriate security baseline for deployment and devops&lt;br /&gt;
&lt;br /&gt;
(2) the process of incident response and related tech.&lt;br /&gt;
&lt;br /&gt;
(3)SecDevOps&lt;br /&gt;
|2017Q2-Q4&lt;br /&gt;
|RIP&lt;br /&gt;
|(1)Best Practice of S-SDLC security Deployment&lt;br /&gt;
&lt;br /&gt;
(2)Best Practice of S-SDLC SecDevOps&lt;br /&gt;
&lt;br /&gt;
(3)Security Baseline for  deployment  and devops&lt;br /&gt;
&lt;br /&gt;
(4)OpenRASP&lt;br /&gt;
|OWASP AppSensor&lt;br /&gt;
OpenRASP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Secure Software Development Lifecycle Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt; --&amp;gt;&lt;br /&gt;
Any interests of the project, please feel free to contact:&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]'''&lt;br /&gt;
* '''[mailto:Gulingzhi@owasp.org.cn Gu lingzhi]'''&lt;br /&gt;
* '''[mailto:xtz@seczone.cn Xia Tianze]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Related stuffs  =&lt;br /&gt;
&lt;br /&gt;
This Page includes S-SDLC releated stuffs. Categorized as a.)Tools b.) Libraries c.)Technical Docs &lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
* '''OpenRASP'''&lt;br /&gt;
OpenRASP is an open-source, free and self-adapting security tool made for OWASP S-SDLC Security Deployment &amp;amp; SecDevOps phase.&lt;br /&gt;
&lt;br /&gt;
It can provide functions like threat detection, data stream monitor, quick-response to production by the deep integration of its protection engine.&lt;br /&gt;
&lt;br /&gt;
Unlike other perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.&lt;br /&gt;
&lt;br /&gt;
When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:&lt;br /&gt;
&lt;br /&gt;
1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;&lt;br /&gt;
&lt;br /&gt;
2. Detailed stack trace is logged, which makes the forensic analysis easier;&lt;br /&gt;
&lt;br /&gt;
3. Insusceptible to malformed protocol.&lt;br /&gt;
&lt;br /&gt;
====== OpenRASP FAQ ======&lt;br /&gt;
1. List of supported web application servers&lt;br /&gt;
&lt;br /&gt;
Only Java based web application servers are supported for now. The support of other web application servers will also be soon included in the coming releases.&lt;br /&gt;
&lt;br /&gt;
OpenRASP on the following application servers for both Linux and Windows platforms has been tested.&lt;br /&gt;
* Tomcat 6-8&lt;br /&gt;
* JBoss 4.X&lt;br /&gt;
* WebLogic 11/12&lt;br /&gt;
2. Performance impact on application servers&lt;br /&gt;
&lt;br /&gt;
Multiple intense and long-lasting stress tests has been taken. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 10%&lt;br /&gt;
&lt;br /&gt;
3. Integration with existing SIEM or SOC&lt;br /&gt;
&lt;br /&gt;
OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.&lt;br /&gt;
&lt;br /&gt;
4. How to develop a new plugin?&lt;br /&gt;
&lt;br /&gt;
A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.&lt;br /&gt;
&lt;br /&gt;
Detailed documents available on [https://github.com/baidu/openrasp github].&lt;br /&gt;
&lt;br /&gt;
== Libraries ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
== Technical Docs ==&lt;br /&gt;
To be added.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=226185</id>
		<title>OWASP Secure Software Development Lifecycle Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Secure_Software_Development_Lifecycle_Project&amp;diff=226185"/>
				<updated>2017-02-09T06:04:31Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The OWASP Security Principles==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, and project leaders should ensure that the description is meaningful.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lightweight S–SDLC  including some PDF and PPT documents:&lt;br /&gt;
&lt;br /&gt;
l   Training: Security Trainings, such as security awareness, fundamentals of application security, S-SDLC introduction and other professional security knowledge.&lt;br /&gt;
l   Requirements Phase: How to evaluate software risk and establish security requirements.&lt;br /&gt;
l   Design Phase: Providing security designing and threat modeling guide.&lt;br /&gt;
l   Implement Phase: OWASP secure coding guide, security function library and code review guide.&lt;br /&gt;
l   Testing Phase: OWASP Testing guide&lt;br /&gt;
l   Release/maintenance Phase: Create vulnerability management guide.&lt;br /&gt;
&lt;br /&gt;
Inevitably applications are designed with security principles architects knew about, security folks included. However, as this project demonstrates there are far more than just a 'few' principles, most of which never make it into the design.&lt;br /&gt;
&lt;br /&gt;
For example, security design happens with perhaps a handful of principles:&lt;br /&gt;
&lt;br /&gt;
* Least Privilege&lt;br /&gt;
* Perimeter Security&lt;br /&gt;
* Defence in Depth&lt;br /&gt;
&lt;br /&gt;
However, we regularly see designs without '''separation of privilege'''!&lt;br /&gt;
&lt;br /&gt;
Think about that, most web applications today have all their eggs in a single basket. The business logic, the identities, passwords, products, policy enforcement, security rules are all found in the same application database that makes up the typical website! It is little wonder then, that attacks on the database have been so completely devastating, since there is no separation of privilege!&lt;br /&gt;
&lt;br /&gt;
The aim of this project, is to identify and describe a minimum functional set of principles that must be present in a secure design.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section must include a shorter description of what the project is, why the project was started, and what security issue is being helped by the project deliverable. This description will be used to promote the project so make sure the description represents your project in the best way possible. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Software Development Lifecycle Project is an overall security software methodology for Web and APP developers. It defines security software development process as well as guides, tools, and templates of activities in each phase.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Although this is a sample template, the project is real! [http://owasp.github.io/Security-Principles Please contribute to this project.]&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Over the course of my career, I have come across and collected a number of security ''aphorisms.'' These aphorisms constitute the fundamental principles of information security.&lt;br /&gt;
&lt;br /&gt;
None of the ideas or truths are mine, and unfortunately, I did not collect the citations. Initially, I would like to identify the correct citations for each aphorism.&lt;br /&gt;
&lt;br /&gt;
Additionally, many are re-statements of the same idea; thus, the 'collection of ideas' defines a fundamental principle. As such, I would also like to reverse engineer the principles from the aphorisms where appropriate, as well.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP Security Principles Project? ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here you should add a short description of what your project actually does. What is the primary goal of your project, and why is it important?&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The end goal is to identify, cite, and document the fundamental principles of information security. Once this is well organised, I think it would be great to publish this through the [http://scriptogr.am/dennis-groves/post/owasp-press OWASP Press]. Of course, it will always remain freely available, and any money collected will go directly into the project to absorb costs with any remaining funds going to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
This document should serve as a guide to technical architects and designers outlining the fundamental principles of security.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to slide presentations related to your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AppSec USA 2013 [https://github.com/OWASP/Security-Principles/tree/master/Presentations/AppSec%20NYC%202013]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dennis_Groves Dennis Groves]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.openhub.net/orgs/OWASP OWASP Project Openhub]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to your repository.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The home of the OWASP Security Principles is on [https://github.com/OWASP/Security-Principles GitHub.] You are encourged to fork, edit and push your changes back to the project through git or edit the project directly on github.&lt;br /&gt;
&lt;br /&gt;
However, if you like you may also download the master repository from the following links:&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/OWASP/Security-Principles/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to press your project has been a part of. Appropriate press includes: Project Leader interviews, articles written about your project, and videos about your project. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you place links to where your project product can be downloaded or purchased, in the case of a book. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Here is where you can let the community know what project stage your project is currently in, whether the project is a builder, breaker, or defender project, and what type of project you are running. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Many projects have &amp;quot;Frequently Asked Questions&amp;quot; documents or pages. However, the point of such a document is not the questions. ''The point of a document like this are the '''answers'''''. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. &lt;br /&gt;
Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. &lt;br /&gt;
Be sure to provide a link to a complete list of all the amazing people in your project's community as well.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dennis_Groves Dennis Groves]&lt;br /&gt;
* [https://github.com/sublimino Andrew Martin]&lt;br /&gt;
* [https://github.com/Lambdanaut Josh Thomas]&lt;br /&gt;
* '''[mailto:Rip@owasp.org.cn RIP]&lt;br /&gt;
* '''[mailto:Gulingzhi@owasp.org.cn Gulingzhi]'''&lt;br /&gt;
* '''[mailto:xtz@seczone.cn Xia Tianze]'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.&lt;br /&gt;
&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
4-1-2016	        S-SDLC overall flow&lt;br /&gt;
4-30-2016	Developing training materials &lt;br /&gt;
6-30-2016	Ligntweight OWASP Security Requirement guideline&lt;br /&gt;
Ligntweight OWASP Security Design guideline&lt;br /&gt;
Ligntweight OWASP Security Baseline development &lt;br /&gt;
7-31-2016	Ligntweight OWASP Serurity Coding Guide &lt;br /&gt;
8-31-2016	Ligntweight OWASP Testing Guide&lt;br /&gt;
9-30-2016	Implementation Guide&lt;br /&gt;
10-15-2016	S-SDLC v1.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	Roadmaps vary in detail from a broad outline to a fully detailed project charter. Generally speaking, projects with detailed roadmaps have tended to develop into successful projects. Some details that leaders may consider placing in the roadmap include: envisioned milestones, planned feature enhancements, essential conditions, project assumptions, development timelines, etc. You are required to have at least 4 milestones for every year the project is active. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As of October 2013, the priorities are:&lt;br /&gt;
* Finish the referencing for each principle.&lt;br /&gt;
* Update the Project Template.&lt;br /&gt;
* Use the OWASP Press to develop a book.&lt;br /&gt;
* Finish and publish the book on Lulu.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Security Principles Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Helping find references to some of the principles.&lt;br /&gt;
* Project administration support. &lt;br /&gt;
* Wiki editing support.&lt;br /&gt;
* Writing support for the book.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This page is where you need to place your legacy project template page if your project was created before October 2013. To edit this page you will need to edit your project information template. You can typically find this page by following this address and substituting your project name where it says &amp;quot;OWASP_Example_Project&amp;quot;. When in doubt, ask the OWASP Projects Manager. &lt;br /&gt;
Example template page: https://www.owasp.org/index.php/Projects/OWASP_Example_Project&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=183865</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=183865"/>
				<updated>2014-10-18T07:44:03Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''President''': [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''Vice President''': Frank Fan &lt;br /&gt;
&lt;br /&gt;
'''Secretary''': [mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Chen Liang,  Bi Ning，Chen Xinlong&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Wang Wenjun&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Tony, Yuan Mingkun, Wu Hanqing&lt;br /&gt;
&lt;br /&gt;
'''武汉：''' Zhang Yan&lt;br /&gt;
&lt;br /&gt;
'''成都：''' Wangjie&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''北美''' [mailto:heleng@owasp.org Helen Gao 高雯]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[maillto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=183864</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=183864"/>
				<updated>2014-10-18T07:34:56Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* OWASP中国研究小组 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全检测基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''President''': [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''Vice President''': Frank Fan CISSP, CISA, GCIA, GCIH, SCJD, SCEA,美国加州大学计算机科学硕士, 十多年网络安全和Web应用安全经验. 05, 06连续两年美国黑帽子大会讲演者. 对Web应用安全深度攻防有着多年的理论和实际经验. &lt;br /&gt;
&lt;br /&gt;
'''Vice President''': 郭涛中国信息安全测评中心，副总工程师，博士，研究方向为漏洞分析&lt;br /&gt;
&lt;br /&gt;
'''Secretary''': [mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Jianchun Jiang, Chen Liang,  Liz&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Wang Wenjun, Song Guohui&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Tony, Yuan Mingkun, Wu Hanqing&lt;br /&gt;
&lt;br /&gt;
'''广州：''' Vincent&lt;br /&gt;
&lt;br /&gt;
'''成都：''' wangjie&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''北美''' [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong] &lt;br /&gt;
#'''北美''' [mailto:heleng@owasp.org Helen Gao 高雯]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[maillto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''最新活动'''  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''过去活动'''  ==&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org.cn OWASP 2011亚洲峰会]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP北京区沙龙''' &lt;br /&gt;
&lt;br /&gt;
'''第一期：探讨互联网接入安全问题''' &lt;br /&gt;
&lt;br /&gt;
参加人数 ：10人 蒋建春教授 李汉南 工信部电信研究院卜哲 人人网安全工程师张建伟 腾讯手机平台负责 陈罡 安氏领信 郭强 owasp北京负责 陈亮 &lt;br /&gt;
&lt;br /&gt;
议题： 大家一起探讨有关互联网安全接入的安全，风险存在点，应急处理，安全体系的组建，各大公司的处理方式等，大家都积极的发言，碰出了很多思路。 &lt;br /&gt;
&lt;br /&gt;
'''第二期：安全管理的运维''' &lt;br /&gt;
&lt;br /&gt;
参加人数：40人，参加人员：李汉南，卜哲，张沈鹏，杨宁，启明星辰若干，瑞星 搜狐 新浪 等共计40多人。 &lt;br /&gt;
&lt;br /&gt;
议题： 探讨安全管理标准，安全运维，看似坚固的站点，还是有很脆弱的一面，杨宁给大家讲授了几个大站的沦陷，很值得我们深思。通过这些问题反映出了，安全架构的重要性，如果想快速渗透一个站点，还是需要对网站架构相当的了解。 &lt;br /&gt;
&lt;br /&gt;
'''第三期''' &lt;br /&gt;
&lt;br /&gt;
参加人数 8人：杨宁，张建伟，孟阳，等 &lt;br /&gt;
&lt;br /&gt;
议题： 小范围讨论xss的产生和漏洞挖掘 ，同时回顾上一期的一些渗透中存在的疑问，做以补充，大家最后的思路，还是回到了网站架构的认知度，还有安全标准的重要性，评估和加固相辅相成。 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/OWASP_China_Summit_2010 '''OWASP 2010中国峰会'''] &lt;br /&gt;
&lt;br /&gt;
'''议题'''：最前沿应用安全领域趋势及现状&amp;amp;amp;“大融合时代”的应用安全 &lt;br /&gt;
&lt;br /&gt;
'''时间'''：2010.10.20-23 &lt;br /&gt;
&lt;br /&gt;
'''地点'''：中国北京 &lt;br /&gt;
&lt;br /&gt;
'''讨论内容'''： &lt;br /&gt;
&lt;br /&gt;
#OWASP 2010中国峰会，将使各行业安全精英汇集一堂，探讨应用安全热点话题，分享先进技术，引领互联网应用安全及业务安全的良性发展； &lt;br /&gt;
#深入探讨应用安全领域技术热点，全面展示互联网应用安全及业务安全解决方案，多方位共享行业最前沿技术。 &lt;br /&gt;
#以高峰论坛、嘉宾问答、晚宴等多种互动形式，剖析最全面、最前沿的应用安全技术； &lt;br /&gt;
#全面专业的应用安全技术及产品展示，推动国内应用安全技术的发展。&lt;br /&gt;
&lt;br /&gt;
详情请见 [http://www.owasp.org/index.php/OWASP_China_Summit_2010 2010中国峰会官网]。 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP(China)2009 &amp;amp;amp; ISF2009年会''' &lt;br /&gt;
&lt;br /&gt;
OWASP是一个开源的、非盈利的全球性安全组织，致力于应用软件的安全研究。我们的使命是使应用 软件更加安全，使企业和组织能够对应用安全风险作出更清晰的决策。目前OWASP全球拥有130个分会近万名会员，共同推动了安全标准、安全测试工具、安 全指导手册等应用安全技术的发展。近几年，OWASP峰会以及各国OWASP年会均取得了巨大的成功，推动了数以百万的IT从业人员对应用安全的关注以及理解，并为各类企业的应用安全提供了明确的指引。作为OWASP中国的第一届年会，OWASP安全专家将为大家带来精彩的演讲. &lt;br /&gt;
&lt;br /&gt;
CISRG是一个活跃的技术研究团队，团队成员都拥有自己特定的技术研究方向，目前的研究方向主要有：操作系统内核、逆向工程、漏洞挖掘、WEB漏洞挖掘及漏洞利用、渗透测试、信息搜集与社会工程。ISF2008为大家带来了许多的惊喜，同时也存在些许的不足。ISF2009将携手OWASP中国，为大家带来一场精彩的信息安全盛会！ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP中国华东应用安全沙龙''' &lt;br /&gt;
&lt;br /&gt;
#议题：主要讨论应用安全技术的发展趋势，目前主流的应用安全技术交流与分享。 &lt;br /&gt;
#时间：2008.6.22 13:30-17:30 &lt;br /&gt;
#地点：杭州 郭庄 &lt;br /&gt;
#报名：请直接发送邮件到[mailto:rip@owasp.org rip] （请包含个人信息，以及关注的内容或者想参与交流的主题，owasp中国分会会员可直接参加）&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''会员介绍'''  ==&lt;br /&gt;
&lt;br /&gt;
'''Member''': [mailto:shenrm@hotmail.com Jessie Shen], [mailto:wujianqiang@gmail.com 吴建强], [mailto:lake2@mail.csdn.net 胡珀], [mailto:girl111_2002@hotmail.com totoro], [mailto:raystyle@gmail.com 宋申雷], [mailto:hackerb@126.com where], [mailto:xuanren_2000@163.com Martin], [mailto:zhengxinwei@snda.com 郑歆炜], [mailto:wuwu119@gmail.com wuwu], [mailto:learn_abc@sohu.com 董安波], [mailto:delta.yeh@gmail.com 叶志强], [mailto:evilcos@gmail.com 钟晨鸣], [mailto:dd5550@163.com 王继刚], [mailto:zhangjun1@ejianlong.com 张俊], [mailto:shujingwang@hotmail.com shujing], [mailto:zhouchaofang@163.com 周超凡], [mailto:sheng.joe.huang@gmail.com Huang Sheng], [mailto:xuzhen@is.iscas.ac.cn 徐震], [mailto:wsn1983@gmail.com 王申南], [mailto:gumphui@yahoo.com.cn 朱辉], [mailto:Zwen@statestreet.com 温智超], [mailto:tonyzhou99@gmail.com Tony], [mailto:boyifeng@126.com 薄一峰], [mailto:wangshu@live.com 王曙], [mailto:zhengqiujiang@live.cn 蒋正秋], [mailto:v-zhlu@microsoft.com Lu ZhanPeng], [mailto:dyxian@139.com 咸德玉], [mailto:landpoint0@163.com youhuai], [mailto:cctec@yahoo.cn Eric], [mailto:cocurrent@gmail.com Bruce],[mailto:xfwebs@gmail.com 谢鹏],[mailto:wei.ouyang@gmail.com Wei Ouyang],[mailto:gj@tstc.org.cn 谷杰],[mailto:alw2000@hotmail.com Dragon],[mailto:haoming76@gmail.com 郝明], 程芃苏, [mailto:zhangjingchao@yapulan.com Chester Zhang], [mailto:aleliu6@gmail.com Ale], [mailto:jimmy@imperva.com jimmy], [mailto:david@webutm.com daivid Chuh], [mailto:wsguor@163.com 非零解], [mailto:dhlduda@yahoo.com.cn linan], [mailto:jackey.zhang.cn@gmail.com Jackey], [mailto:kk0915@gmail.com clider yuan], [mailto:wy2000@gmail.com Jorward], [mailto:hwang@fortify.com Hong Wang], [mailto:firefox.fst@gmail.com FireFox], [mailto:kevin@80sec.com 凯文], [mailto:2747658@qq.com Tinysxing], [mailto:amxku@msn.com amxku], [mailto:erlv5241@gmail.com erlv], [mailto:shenxianbeibei@gmail.com Mathacker Math], [mailto:sean@attomsoft.com Sean Walker], [mailto:sailer.shen@gmail.com sailer shen], [mailto:zhangelsu@gmail.com Pengyu Zhang],[mailto:hyddd@163.com Hyddd], [mailto:everyday1700@hotmail.com 刘辉], [mailto:lee_otto@hotmail.com Otto Lee], [mailto:yujian@venustech.com.cn 于舰], [mailto:shadow@x3y3.org 张晨],[mailto:toqinbo@gmail.com 秦波]， [mailto:flood_linux@163.com Steve Huang]， [mailto:itisarandomname@gmail.com Darkness]， [mailto:bluezhao@nanhai.gd.cn bluezhao]， [mailto:zhwy2000@gmail.com zhang wenyi]， [mailto:aenjoy@gmail.com 殷钧钧]， [mailto:lyt19823027@sina.com 刘猷韬]， [mailto:fei_zou@trendmicro.com.cn 邹飞]， [mailto:hustmen@hotmail.com Bruce Liu]， [mailto:websuperboy@163.com Seraph Nie]， [mailto:qiulihong@gmail.com 邱立宏]， [mailto:weijia_huang@sohu.com 黄炜珈]， [mailto:docwang51@gmail.com docwang51]， [mailto:zigaoliu@hotmail.com 刘自高]， [mailto:frankljq@hotmail.com Jason Lin]， [mailto:newweapon111@gmail.com Liu Weiping]， [mailto:yuanfan_163@163.com 远帆]， [mailto:chenp@beijingit.gov.cn 陈萍]， [mailto:manager@chencunli.cn 陈存利]， [mailto:icuc88@yahoo.com Eric Zhong]， [mailto:liukes@ln.chinamobile.com 刘可]， [mailto:liweim@163.com munix]， [mailto:pentest@live.cn L7]， [mailto:Xuanxh@asiainfo.com 轩晓荷]， [mailto:lily8669@126.com 王一一]， [mailto:tinonetwork@gmail.com Tino Wang]， [mailto:hackwoman1977@gmail.com Richard.liu]， [mailto:oldlary@yahoo.com.cn 李建军]， [mailto:fanjunfj@cn.ibm.com 范俊]， [mailto:248690968@qq.com tony_liu518]， [mailto:jack.zhang@digobtain.com.cn Jack]， [mailto:linuxrootkit2008@gmail.com 杨宁]， [mailto:max.chen.c@gmail.com Max Chen], [mailto:qiu.danny@gmail.com Danny Qiu],[mailto:shiyun24@163.com 石云], [mailto:Kryson@CISRG.com Kryson], [mailto:qzjqh567@sina.com 曲志军], [mailto:itsecurity@163.com Amu], [mailto:libo.swust@gmail.com 李波]， [mailto:jingjing_echo@hotmail.com Jing Zhang]， [mailto:reject.wl@gmail.com 魏力]， [mailto:fonix@sohu.com Fonix Li]，[mailto:tomtudos@126.com xiaomage]， [mailto:vincemong@163.com VinceMong]， [mailto:wqs8077@163.com wqs8077]， [mailto:jack.gao.ch@gmail.com 高广鹏]， [mailto:kun.liuk@alipay.com 刘坤]， [mailto:Coolc@qq.com coolcyang]， [mailto:jupiterhyun@hotmail.com jupiterhyun]， [mailto:yuanxd@hotmail.com Xiaodong Yuan]， [mailto:curthan2002@sina.com curthan]， [mailto:fanfox7405@163.com 樊山]， [mailto:mr.zhaoxiang@gmail.com zhao xiang]， [mailto:J.Wang3@lboro.ac.uk Jie Wang]， [mailto:donglibo5252@163.com donglibo5252]， [mailto:xqdong@ctrip.com vdxq董晓琼]， [mailto:jean_he@trendmicro.com.cn jean_he]， [mailto:weizhunsun@163.com weizhunsun]， [mailto:aliceraul@gmail.com Alice]， [mailto:xingly@nipc.org.cn 邢璐祎]， [mailto:minemys@gmail.com 马玉书]， [mailto:yao_zhiwu@hotmail.com yao_zhiwu]， [mailto:zxin.nju@gmail.com Xin Zhi]， [mailto:55984512@qq.com 网路游侠]， [mailto:flying.kwok@gmail.com flying]， [mailto:omgwxl@163.com 王筱鎏]， [mailto:jeantoe@gmail.com 张逸群]， [mailto:tzsm11@qq.com 黑海洋]， [mailto:mr.linuxer@live.cn 無材]， [mailto:zhengm04@mails.tsinghua.edu.cn 郑明]， [mailto:flood_linux@163.com Steve Huang]， [mailto:cool_h2o@163.com victor]， [mailto:l3n6m0@yahoo.com 陈诚]， [mailto:joinbaijun@gmail.com 白峻]， [mailto:dreamice.jiang@gmail.com 江均勇]， [mailto:gmwshz@gmail.com 纯色]， [mailto:ideq0x1@gmail.com 李宁]， [mailto:yangbo9297@qq.com yangbo]， [mailto:linxinsnow@163.com linxinsnow]， [mailto:powerosso@powerosso.com 李宁]， [mailto:advancesun@163.com 孙歆]， [mailto:ntpcn@yahoo.cn 王蒙]， [mailto:cabjdp@gmail.com Waterwave]， [mailto:qiejunli@gmail.com 郄军利]， [mailto:ellle@qq.com ellle]， [mailto:chengyu80@163.com 程渝]， [mailto:jiuchuanlin@Hotmail.com jiuchuan lin]， [mailto:wjphero@163.com 吴金鹏]， [mailto:provisional@163.com 小秦]， [mailto:421010182@qq.com 李锦华]， [mailto:jiangzengzeng@ec.com.cn 蒋增增]， [mailto:22018188@qq.com 吴新]， [mailto:lightlan@msn.com 02zhou]， [mailto:kanava88@gmail.com FangZheng Hu]， [mailto:gaojun55@gmail.com J.gao]， [mailto:liuchen1987323@yahoo.com.cn 刘辰]， [mailto:dllhlx@gmail.com dllhlx]， &lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=183863</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=183863"/>
				<updated>2014-10-18T07:34:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* OWASP中国研究小组 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
#'''移动应用安全测评基准'''&lt;br /&gt;
#'''WAF测评基准'''&lt;br /&gt;
#'''Web扫描器测评基准'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''President''': [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''Vice President''': Frank Fan CISSP, CISA, GCIA, GCIH, SCJD, SCEA,美国加州大学计算机科学硕士, 十多年网络安全和Web应用安全经验. 05, 06连续两年美国黑帽子大会讲演者. 对Web应用安全深度攻防有着多年的理论和实际经验. &lt;br /&gt;
&lt;br /&gt;
'''Vice President''': 郭涛中国信息安全测评中心，副总工程师，博士，研究方向为漏洞分析&lt;br /&gt;
&lt;br /&gt;
'''Secretary''': [mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Jianchun Jiang, Chen Liang,  Liz&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Wang Wenjun, Song Guohui&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Tony, Yuan Mingkun, Wu Hanqing&lt;br /&gt;
&lt;br /&gt;
'''广州：''' Vincent&lt;br /&gt;
&lt;br /&gt;
'''成都：''' wangjie&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''北美''' [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong] &lt;br /&gt;
#'''北美''' [mailto:heleng@owasp.org Helen Gao 高雯]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[maillto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''最新活动'''  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''过去活动'''  ==&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org.cn OWASP 2011亚洲峰会]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP北京区沙龙''' &lt;br /&gt;
&lt;br /&gt;
'''第一期：探讨互联网接入安全问题''' &lt;br /&gt;
&lt;br /&gt;
参加人数 ：10人 蒋建春教授 李汉南 工信部电信研究院卜哲 人人网安全工程师张建伟 腾讯手机平台负责 陈罡 安氏领信 郭强 owasp北京负责 陈亮 &lt;br /&gt;
&lt;br /&gt;
议题： 大家一起探讨有关互联网安全接入的安全，风险存在点，应急处理，安全体系的组建，各大公司的处理方式等，大家都积极的发言，碰出了很多思路。 &lt;br /&gt;
&lt;br /&gt;
'''第二期：安全管理的运维''' &lt;br /&gt;
&lt;br /&gt;
参加人数：40人，参加人员：李汉南，卜哲，张沈鹏，杨宁，启明星辰若干，瑞星 搜狐 新浪 等共计40多人。 &lt;br /&gt;
&lt;br /&gt;
议题： 探讨安全管理标准，安全运维，看似坚固的站点，还是有很脆弱的一面，杨宁给大家讲授了几个大站的沦陷，很值得我们深思。通过这些问题反映出了，安全架构的重要性，如果想快速渗透一个站点，还是需要对网站架构相当的了解。 &lt;br /&gt;
&lt;br /&gt;
'''第三期''' &lt;br /&gt;
&lt;br /&gt;
参加人数 8人：杨宁，张建伟，孟阳，等 &lt;br /&gt;
&lt;br /&gt;
议题： 小范围讨论xss的产生和漏洞挖掘 ，同时回顾上一期的一些渗透中存在的疑问，做以补充，大家最后的思路，还是回到了网站架构的认知度，还有安全标准的重要性，评估和加固相辅相成。 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/OWASP_China_Summit_2010 '''OWASP 2010中国峰会'''] &lt;br /&gt;
&lt;br /&gt;
'''议题'''：最前沿应用安全领域趋势及现状&amp;amp;amp;“大融合时代”的应用安全 &lt;br /&gt;
&lt;br /&gt;
'''时间'''：2010.10.20-23 &lt;br /&gt;
&lt;br /&gt;
'''地点'''：中国北京 &lt;br /&gt;
&lt;br /&gt;
'''讨论内容'''： &lt;br /&gt;
&lt;br /&gt;
#OWASP 2010中国峰会，将使各行业安全精英汇集一堂，探讨应用安全热点话题，分享先进技术，引领互联网应用安全及业务安全的良性发展； &lt;br /&gt;
#深入探讨应用安全领域技术热点，全面展示互联网应用安全及业务安全解决方案，多方位共享行业最前沿技术。 &lt;br /&gt;
#以高峰论坛、嘉宾问答、晚宴等多种互动形式，剖析最全面、最前沿的应用安全技术； &lt;br /&gt;
#全面专业的应用安全技术及产品展示，推动国内应用安全技术的发展。&lt;br /&gt;
&lt;br /&gt;
详情请见 [http://www.owasp.org/index.php/OWASP_China_Summit_2010 2010中国峰会官网]。 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP(China)2009 &amp;amp;amp; ISF2009年会''' &lt;br /&gt;
&lt;br /&gt;
OWASP是一个开源的、非盈利的全球性安全组织，致力于应用软件的安全研究。我们的使命是使应用 软件更加安全，使企业和组织能够对应用安全风险作出更清晰的决策。目前OWASP全球拥有130个分会近万名会员，共同推动了安全标准、安全测试工具、安 全指导手册等应用安全技术的发展。近几年，OWASP峰会以及各国OWASP年会均取得了巨大的成功，推动了数以百万的IT从业人员对应用安全的关注以及理解，并为各类企业的应用安全提供了明确的指引。作为OWASP中国的第一届年会，OWASP安全专家将为大家带来精彩的演讲. &lt;br /&gt;
&lt;br /&gt;
CISRG是一个活跃的技术研究团队，团队成员都拥有自己特定的技术研究方向，目前的研究方向主要有：操作系统内核、逆向工程、漏洞挖掘、WEB漏洞挖掘及漏洞利用、渗透测试、信息搜集与社会工程。ISF2008为大家带来了许多的惊喜，同时也存在些许的不足。ISF2009将携手OWASP中国，为大家带来一场精彩的信息安全盛会！ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP中国华东应用安全沙龙''' &lt;br /&gt;
&lt;br /&gt;
#议题：主要讨论应用安全技术的发展趋势，目前主流的应用安全技术交流与分享。 &lt;br /&gt;
#时间：2008.6.22 13:30-17:30 &lt;br /&gt;
#地点：杭州 郭庄 &lt;br /&gt;
#报名：请直接发送邮件到[mailto:rip@owasp.org rip] （请包含个人信息，以及关注的内容或者想参与交流的主题，owasp中国分会会员可直接参加）&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''会员介绍'''  ==&lt;br /&gt;
&lt;br /&gt;
'''Member''': [mailto:shenrm@hotmail.com Jessie Shen], [mailto:wujianqiang@gmail.com 吴建强], [mailto:lake2@mail.csdn.net 胡珀], [mailto:girl111_2002@hotmail.com totoro], [mailto:raystyle@gmail.com 宋申雷], [mailto:hackerb@126.com where], [mailto:xuanren_2000@163.com Martin], [mailto:zhengxinwei@snda.com 郑歆炜], [mailto:wuwu119@gmail.com wuwu], [mailto:learn_abc@sohu.com 董安波], [mailto:delta.yeh@gmail.com 叶志强], [mailto:evilcos@gmail.com 钟晨鸣], [mailto:dd5550@163.com 王继刚], [mailto:zhangjun1@ejianlong.com 张俊], [mailto:shujingwang@hotmail.com shujing], [mailto:zhouchaofang@163.com 周超凡], [mailto:sheng.joe.huang@gmail.com Huang Sheng], [mailto:xuzhen@is.iscas.ac.cn 徐震], [mailto:wsn1983@gmail.com 王申南], [mailto:gumphui@yahoo.com.cn 朱辉], [mailto:Zwen@statestreet.com 温智超], [mailto:tonyzhou99@gmail.com Tony], [mailto:boyifeng@126.com 薄一峰], [mailto:wangshu@live.com 王曙], [mailto:zhengqiujiang@live.cn 蒋正秋], [mailto:v-zhlu@microsoft.com Lu ZhanPeng], [mailto:dyxian@139.com 咸德玉], [mailto:landpoint0@163.com youhuai], [mailto:cctec@yahoo.cn Eric], [mailto:cocurrent@gmail.com Bruce],[mailto:xfwebs@gmail.com 谢鹏],[mailto:wei.ouyang@gmail.com Wei Ouyang],[mailto:gj@tstc.org.cn 谷杰],[mailto:alw2000@hotmail.com Dragon],[mailto:haoming76@gmail.com 郝明], 程芃苏, [mailto:zhangjingchao@yapulan.com Chester Zhang], [mailto:aleliu6@gmail.com Ale], [mailto:jimmy@imperva.com jimmy], [mailto:david@webutm.com daivid Chuh], [mailto:wsguor@163.com 非零解], [mailto:dhlduda@yahoo.com.cn linan], [mailto:jackey.zhang.cn@gmail.com Jackey], [mailto:kk0915@gmail.com clider yuan], [mailto:wy2000@gmail.com Jorward], [mailto:hwang@fortify.com Hong Wang], [mailto:firefox.fst@gmail.com FireFox], [mailto:kevin@80sec.com 凯文], [mailto:2747658@qq.com Tinysxing], [mailto:amxku@msn.com amxku], [mailto:erlv5241@gmail.com erlv], [mailto:shenxianbeibei@gmail.com Mathacker Math], [mailto:sean@attomsoft.com Sean Walker], [mailto:sailer.shen@gmail.com sailer shen], [mailto:zhangelsu@gmail.com Pengyu Zhang],[mailto:hyddd@163.com Hyddd], [mailto:everyday1700@hotmail.com 刘辉], [mailto:lee_otto@hotmail.com Otto Lee], [mailto:yujian@venustech.com.cn 于舰], [mailto:shadow@x3y3.org 张晨],[mailto:toqinbo@gmail.com 秦波]， [mailto:flood_linux@163.com Steve Huang]， [mailto:itisarandomname@gmail.com Darkness]， [mailto:bluezhao@nanhai.gd.cn bluezhao]， [mailto:zhwy2000@gmail.com zhang wenyi]， [mailto:aenjoy@gmail.com 殷钧钧]， [mailto:lyt19823027@sina.com 刘猷韬]， [mailto:fei_zou@trendmicro.com.cn 邹飞]， [mailto:hustmen@hotmail.com Bruce Liu]， [mailto:websuperboy@163.com Seraph Nie]， [mailto:qiulihong@gmail.com 邱立宏]， [mailto:weijia_huang@sohu.com 黄炜珈]， [mailto:docwang51@gmail.com docwang51]， [mailto:zigaoliu@hotmail.com 刘自高]， [mailto:frankljq@hotmail.com Jason Lin]， [mailto:newweapon111@gmail.com Liu Weiping]， [mailto:yuanfan_163@163.com 远帆]， [mailto:chenp@beijingit.gov.cn 陈萍]， [mailto:manager@chencunli.cn 陈存利]， [mailto:icuc88@yahoo.com Eric Zhong]， [mailto:liukes@ln.chinamobile.com 刘可]， [mailto:liweim@163.com munix]， [mailto:pentest@live.cn L7]， [mailto:Xuanxh@asiainfo.com 轩晓荷]， [mailto:lily8669@126.com 王一一]， [mailto:tinonetwork@gmail.com Tino Wang]， [mailto:hackwoman1977@gmail.com Richard.liu]， [mailto:oldlary@yahoo.com.cn 李建军]， [mailto:fanjunfj@cn.ibm.com 范俊]， [mailto:248690968@qq.com tony_liu518]， [mailto:jack.zhang@digobtain.com.cn Jack]， [mailto:linuxrootkit2008@gmail.com 杨宁]， [mailto:max.chen.c@gmail.com Max Chen], [mailto:qiu.danny@gmail.com Danny Qiu],[mailto:shiyun24@163.com 石云], [mailto:Kryson@CISRG.com Kryson], [mailto:qzjqh567@sina.com 曲志军], [mailto:itsecurity@163.com Amu], [mailto:libo.swust@gmail.com 李波]， [mailto:jingjing_echo@hotmail.com Jing Zhang]， [mailto:reject.wl@gmail.com 魏力]， [mailto:fonix@sohu.com Fonix Li]，[mailto:tomtudos@126.com xiaomage]， [mailto:vincemong@163.com VinceMong]， [mailto:wqs8077@163.com wqs8077]， [mailto:jack.gao.ch@gmail.com 高广鹏]， [mailto:kun.liuk@alipay.com 刘坤]， [mailto:Coolc@qq.com coolcyang]， [mailto:jupiterhyun@hotmail.com jupiterhyun]， [mailto:yuanxd@hotmail.com Xiaodong Yuan]， [mailto:curthan2002@sina.com curthan]， [mailto:fanfox7405@163.com 樊山]， [mailto:mr.zhaoxiang@gmail.com zhao xiang]， [mailto:J.Wang3@lboro.ac.uk Jie Wang]， [mailto:donglibo5252@163.com donglibo5252]， [mailto:xqdong@ctrip.com vdxq董晓琼]， [mailto:jean_he@trendmicro.com.cn jean_he]， [mailto:weizhunsun@163.com weizhunsun]， [mailto:aliceraul@gmail.com Alice]， [mailto:xingly@nipc.org.cn 邢璐祎]， [mailto:minemys@gmail.com 马玉书]， [mailto:yao_zhiwu@hotmail.com yao_zhiwu]， [mailto:zxin.nju@gmail.com Xin Zhi]， [mailto:55984512@qq.com 网路游侠]， [mailto:flying.kwok@gmail.com flying]， [mailto:omgwxl@163.com 王筱鎏]， [mailto:jeantoe@gmail.com 张逸群]， [mailto:tzsm11@qq.com 黑海洋]， [mailto:mr.linuxer@live.cn 無材]， [mailto:zhengm04@mails.tsinghua.edu.cn 郑明]， [mailto:flood_linux@163.com Steve Huang]， [mailto:cool_h2o@163.com victor]， [mailto:l3n6m0@yahoo.com 陈诚]， [mailto:joinbaijun@gmail.com 白峻]， [mailto:dreamice.jiang@gmail.com 江均勇]， [mailto:gmwshz@gmail.com 纯色]， [mailto:ideq0x1@gmail.com 李宁]， [mailto:yangbo9297@qq.com yangbo]， [mailto:linxinsnow@163.com linxinsnow]， [mailto:powerosso@powerosso.com 李宁]， [mailto:advancesun@163.com 孙歆]， [mailto:ntpcn@yahoo.cn 王蒙]， [mailto:cabjdp@gmail.com Waterwave]， [mailto:qiejunli@gmail.com 郄军利]， [mailto:ellle@qq.com ellle]， [mailto:chengyu80@163.com 程渝]， [mailto:jiuchuanlin@Hotmail.com jiuchuan lin]， [mailto:wjphero@163.com 吴金鹏]， [mailto:provisional@163.com 小秦]， [mailto:421010182@qq.com 李锦华]， [mailto:jiangzengzeng@ec.com.cn 蒋增增]， [mailto:22018188@qq.com 吴新]， [mailto:lightlan@msn.com 02zhou]， [mailto:kanava88@gmail.com FangZheng Hu]， [mailto:gaojun55@gmail.com J.gao]， [mailto:liuchen1987323@yahoo.com.cn 刘辰]， [mailto:dllhlx@gmail.com dllhlx]， &lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=179317</id>
		<title>China-Mainland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=China-Mainland&amp;diff=179317"/>
				<updated>2014-07-26T03:27:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* OWASP中国研究小组 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP China logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=China-Mainland|extra=The chapter leader is [mailto:rip@owasp.org Rip Torn]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-China-Mainland|emailarchives=https://lists.owasp.org/pipermail/owasp-china-mainland}} &lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org.cn '''OWASP中国网站'''] ==&lt;br /&gt;
OWASP中国最新信息，请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
 &lt;br /&gt;
== '''OWASP中国研究小组'''  ==&lt;br /&gt;
&lt;br /&gt;
为了更好的促进OWASP中国各区域的沙龙、活动能够持续、稳定的进行，OWASP中国特成立的各区域小组，主要为了促进小范围内的交流和分享。同时，也非常欢迎大家自荐成为自己所在区域的负责人。OWASP中国项目研究组以目前OWASP的开源项目为基础，深入研究各类应用安全技术，并输出相关中文资料、培训文档、安全工具等。同时，也会不定期的在各区域的活动上做相关培训。详细信息请查看OWASP中国网站：http://www.owasp.org.cn  &lt;br /&gt;
&lt;br /&gt;
'''OWASP中国项目研究组''' &lt;br /&gt;
&lt;br /&gt;
#'''OWASP Top 10''' &lt;br /&gt;
#'''OWASP Testing Guide''' &lt;br /&gt;
#'''OWASP WebGoat''' &lt;br /&gt;
#'''OWASP WebScarab''' &lt;br /&gt;
#'''应用安全评估'''&lt;br /&gt;
#'''Code Review Guide''&lt;br /&gt;
#'''Development Guide'''&lt;br /&gt;
#'''OWASP OpenSAMM'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Chinese_Project OWASP中国项目]''' &lt;br /&gt;
&lt;br /&gt;
#OWASP Top 10项目 [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf '''download'''] &lt;br /&gt;
#OWASP TEST GUIDE 中文版'''[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf download]''' &lt;br /&gt;
#OWASP SAMM  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/owasp-samm/samm/owasp-samm download]''' &lt;br /&gt;
#OWASP Cloud ‐ 10 Project '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/Cloud_10/cloud_10 download]''' &lt;br /&gt;
#WAF测试基准 &lt;br /&gt;
#Webscan验证平台 &lt;br /&gt;
#OWASP AntiSamy Java项目 '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_Java/owasp-antisamy-java download]'''&lt;br /&gt;
#OWASP AntiSamy .NET项目  '''[http://www.owasp.org.cn/owasp-project/Finished_Projects/OWASP_AntiSamy_.NET/owasp-antisamy.net download]'''&lt;br /&gt;
#OWASP Enterprise Security API (ESAPI)项目 &lt;br /&gt;
#OWASP Live CD项目&lt;br /&gt;
&lt;br /&gt;
== '''OWASP中国负责人'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国区域负责人''' &lt;br /&gt;
&lt;br /&gt;
'''President''': [mailto:rip@owasp.org Rip Torn] &lt;br /&gt;
&lt;br /&gt;
'''Vice President''': Frank Fan CISSP, CISA, GCIA, GCIH, SCJD, SCEA,美国加州大学计算机科学硕士, 十多年网络安全和Web应用安全经验. 05, 06连续两年美国黑帽子大会讲演者. 对Web应用安全深度攻防有着多年的理论和实际经验. &lt;br /&gt;
&lt;br /&gt;
'''Vice President''': 郭涛中国信息安全测评中心，副总工程师，博士，研究方向为漏洞分析&lt;br /&gt;
&lt;br /&gt;
'''Secretary''': [mailto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
'''北京：'''  Jianchun Jiang, Chen Liang,  Liz&lt;br /&gt;
&lt;br /&gt;
'''山东：''' McFord&lt;br /&gt;
&lt;br /&gt;
'''上海：''' Wang Wenjun, Song Guohui&lt;br /&gt;
&lt;br /&gt;
'''杭州：''' Tony, Yuan Mingkun, Wu Hanqing&lt;br /&gt;
&lt;br /&gt;
'''广州：''' Vincent&lt;br /&gt;
&lt;br /&gt;
'''成都：''' wangjie&lt;br /&gt;
&lt;br /&gt;
'''OWASP中国海外区域负责人''' &lt;br /&gt;
&lt;br /&gt;
#'''北美''' [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong] &lt;br /&gt;
#'''北美''' [mailto:heleng@owasp.org Helen Gao 高雯]&lt;br /&gt;
&lt;br /&gt;
== '''赞助OWASP组织（NEW）''' ==&lt;br /&gt;
&lt;br /&gt;
为了更好的服务于客户以及支持OWASP项目的持续研究，我们将非常欢迎您参与并赞助OWASP中国! &lt;br /&gt;
&lt;br /&gt;
'''个人会员''' &lt;br /&gt;
&lt;br /&gt;
成为个人赞助者有如下要求： &lt;br /&gt;
&lt;br /&gt;
#免费参与OWASP中国举办的各种会议 &lt;br /&gt;
#参与OWASP中国培训享有会员折扣 &lt;br /&gt;
#获得owasp中国专属邮箱 &lt;br /&gt;
&lt;br /&gt;
'''会议赞助''' 赞助OWASP各类会议， &lt;br /&gt;
&lt;br /&gt;
#提交公司logo到OWASP中国网站（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国会会议中推广应用安全产品和服务 &lt;br /&gt;
#参与OWASP中国项目研究 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''企业赞助''' 支持OWASP各项目和补助金活动，获得OWASP会议展示产品和服务的折扣 &lt;br /&gt;
&lt;br /&gt;
#免费获得30天OWASP中国首页展示浮动banner的机会 &lt;br /&gt;
#在OWASP中国网站展示logo（150px X 45px at 72dpi or 55px X 80px at 72dpi的GIF,JPG或PNG文件) &lt;br /&gt;
#在OWASP中国邮件列表中列为赞助者。 &lt;br /&gt;
#OWASP中国峰会或OWASP合作举办的会议可以享受折扣。 &lt;br /&gt;
#可以申请在当地举办OWASP地区会议 &lt;br /&gt;
&lt;br /&gt;
以上具体请联系：[maillto:Ivy@owasp.org.cn Ivy Zhang]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''最新活动'''  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''过去活动'''  ==&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org.cn OWASP 2011亚洲峰会]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP北京区沙龙''' &lt;br /&gt;
&lt;br /&gt;
'''第一期：探讨互联网接入安全问题''' &lt;br /&gt;
&lt;br /&gt;
参加人数 ：10人 蒋建春教授 李汉南 工信部电信研究院卜哲 人人网安全工程师张建伟 腾讯手机平台负责 陈罡 安氏领信 郭强 owasp北京负责 陈亮 &lt;br /&gt;
&lt;br /&gt;
议题： 大家一起探讨有关互联网安全接入的安全，风险存在点，应急处理，安全体系的组建，各大公司的处理方式等，大家都积极的发言，碰出了很多思路。 &lt;br /&gt;
&lt;br /&gt;
'''第二期：安全管理的运维''' &lt;br /&gt;
&lt;br /&gt;
参加人数：40人，参加人员：李汉南，卜哲，张沈鹏，杨宁，启明星辰若干，瑞星 搜狐 新浪 等共计40多人。 &lt;br /&gt;
&lt;br /&gt;
议题： 探讨安全管理标准，安全运维，看似坚固的站点，还是有很脆弱的一面，杨宁给大家讲授了几个大站的沦陷，很值得我们深思。通过这些问题反映出了，安全架构的重要性，如果想快速渗透一个站点，还是需要对网站架构相当的了解。 &lt;br /&gt;
&lt;br /&gt;
'''第三期''' &lt;br /&gt;
&lt;br /&gt;
参加人数 8人：杨宁，张建伟，孟阳，等 &lt;br /&gt;
&lt;br /&gt;
议题： 小范围讨论xss的产生和漏洞挖掘 ，同时回顾上一期的一些渗透中存在的疑问，做以补充，大家最后的思路，还是回到了网站架构的认知度，还有安全标准的重要性，评估和加固相辅相成。 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/OWASP_China_Summit_2010 '''OWASP 2010中国峰会'''] &lt;br /&gt;
&lt;br /&gt;
'''议题'''：最前沿应用安全领域趋势及现状&amp;amp;amp;“大融合时代”的应用安全 &lt;br /&gt;
&lt;br /&gt;
'''时间'''：2010.10.20-23 &lt;br /&gt;
&lt;br /&gt;
'''地点'''：中国北京 &lt;br /&gt;
&lt;br /&gt;
'''讨论内容'''： &lt;br /&gt;
&lt;br /&gt;
#OWASP 2010中国峰会，将使各行业安全精英汇集一堂，探讨应用安全热点话题，分享先进技术，引领互联网应用安全及业务安全的良性发展； &lt;br /&gt;
#深入探讨应用安全领域技术热点，全面展示互联网应用安全及业务安全解决方案，多方位共享行业最前沿技术。 &lt;br /&gt;
#以高峰论坛、嘉宾问答、晚宴等多种互动形式，剖析最全面、最前沿的应用安全技术； &lt;br /&gt;
#全面专业的应用安全技术及产品展示，推动国内应用安全技术的发展。&lt;br /&gt;
&lt;br /&gt;
详情请见 [http://www.owasp.org/index.php/OWASP_China_Summit_2010 2010中国峰会官网]。 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP(China)2009 &amp;amp;amp; ISF2009年会''' &lt;br /&gt;
&lt;br /&gt;
OWASP是一个开源的、非盈利的全球性安全组织，致力于应用软件的安全研究。我们的使命是使应用 软件更加安全，使企业和组织能够对应用安全风险作出更清晰的决策。目前OWASP全球拥有130个分会近万名会员，共同推动了安全标准、安全测试工具、安 全指导手册等应用安全技术的发展。近几年，OWASP峰会以及各国OWASP年会均取得了巨大的成功，推动了数以百万的IT从业人员对应用安全的关注以及理解，并为各类企业的应用安全提供了明确的指引。作为OWASP中国的第一届年会，OWASP安全专家将为大家带来精彩的演讲. &lt;br /&gt;
&lt;br /&gt;
CISRG是一个活跃的技术研究团队，团队成员都拥有自己特定的技术研究方向，目前的研究方向主要有：操作系统内核、逆向工程、漏洞挖掘、WEB漏洞挖掘及漏洞利用、渗透测试、信息搜集与社会工程。ISF2008为大家带来了许多的惊喜，同时也存在些许的不足。ISF2009将携手OWASP中国，为大家带来一场精彩的信息安全盛会！ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP中国华东应用安全沙龙''' &lt;br /&gt;
&lt;br /&gt;
#议题：主要讨论应用安全技术的发展趋势，目前主流的应用安全技术交流与分享。 &lt;br /&gt;
#时间：2008.6.22 13:30-17:30 &lt;br /&gt;
#地点：杭州 郭庄 &lt;br /&gt;
#报名：请直接发送邮件到[mailto:rip@owasp.org rip] （请包含个人信息，以及关注的内容或者想参与交流的主题，owasp中国分会会员可直接参加）&lt;br /&gt;
&lt;br /&gt;
== '''技术分享'''  ==&lt;br /&gt;
&lt;br /&gt;
#警惕网络群注风暴的逼近：当龙卷风或者特大暴风雪来临之际, 往往显得特别宁静. 希望这个不会应验到国内的网站上。因为在过去的几个月内国外已经连续发生两次的网站群注风暴. 总共有十几万个网站在短短几天内被无情摧残, 更重要的是, 所有访问这些网站的无辜网民也成了最终的受害者. 各类盗号木马百花齐放.【[https://www.owasp.org/images/5/5f/%E8%AD%A6%E6%83%95%E7%BD%91%E7%BB%9C%E7%BE%A4%E6%B3%A8%E9%A3%8E%E6%9A%B4%E7%9A%84%E9%80%BC%E8%BF%91.doc 资源下载]】 &lt;br /&gt;
#Pangolin是一款Windows平台下的自动化SQL注入渗透测试工具,感谢Vincent Chao提供OWASP中国分会专用版Pangolin.[https://www.owasp.org/images/0/0f/Pangolin_owasp.zip Pangolin工具下载]，[https://www.owasp.org/images/b/bd/%E5%9F%BA%E6%9C%AC%E4%BD%BF%E7%94%A8%E6%89%8B%E5%86%8C.doc 基本使用手册]&lt;br /&gt;
&lt;br /&gt;
== '''会员专享区'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;大家可以免费加入OWASP中国分会，会员可享有：&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#应用安全技术交流邀请函 &lt;br /&gt;
#商业web、DB安全软件体验版 &lt;br /&gt;
#国内外最新的安全技术资料&lt;br /&gt;
&lt;br /&gt;
== '''加入OWASP中国分会'''  ==&lt;br /&gt;
&lt;br /&gt;
'''对OWASP中国分会会员可以完全开放分会的所有安全资源（安全工具、安全资料等）''' &lt;br /&gt;
&lt;br /&gt;
'''可以优先获得各种安全技术交流邀请函''' &lt;br /&gt;
&lt;br /&gt;
加入分会前，请您仔细阅读[https://www.owasp.org/index.php/Chapter_Rules 分会会员守则]，申请会员加入，请将如下信息邮件发送给[mailto:member@owasp.org.cn 会长]。 &lt;br /&gt;
&lt;br /&gt;
#邮件标题：OWASP中国会员注册（姓名） &lt;br /&gt;
#姓名： &lt;br /&gt;
#单位： &lt;br /&gt;
#职位： &lt;br /&gt;
#电子邮件： &lt;br /&gt;
#联系电话： &lt;br /&gt;
#个人研究方向： &lt;br /&gt;
#愿意参与研究领域：&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#ff0000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''会员介绍'''  ==&lt;br /&gt;
&lt;br /&gt;
'''Member''': [mailto:shenrm@hotmail.com Jessie Shen], [mailto:wujianqiang@gmail.com 吴建强], [mailto:lake2@mail.csdn.net 胡珀], [mailto:girl111_2002@hotmail.com totoro], [mailto:raystyle@gmail.com 宋申雷], [mailto:hackerb@126.com where], [mailto:xuanren_2000@163.com Martin], [mailto:zhengxinwei@snda.com 郑歆炜], [mailto:wuwu119@gmail.com wuwu], [mailto:learn_abc@sohu.com 董安波], [mailto:delta.yeh@gmail.com 叶志强], [mailto:evilcos@gmail.com 钟晨鸣], [mailto:dd5550@163.com 王继刚], [mailto:zhangjun1@ejianlong.com 张俊], [mailto:shujingwang@hotmail.com shujing], [mailto:zhouchaofang@163.com 周超凡], [mailto:sheng.joe.huang@gmail.com Huang Sheng], [mailto:xuzhen@is.iscas.ac.cn 徐震], [mailto:wsn1983@gmail.com 王申南], [mailto:gumphui@yahoo.com.cn 朱辉], [mailto:Zwen@statestreet.com 温智超], [mailto:tonyzhou99@gmail.com Tony], [mailto:boyifeng@126.com 薄一峰], [mailto:wangshu@live.com 王曙], [mailto:zhengqiujiang@live.cn 蒋正秋], [mailto:v-zhlu@microsoft.com Lu ZhanPeng], [mailto:dyxian@139.com 咸德玉], [mailto:landpoint0@163.com youhuai], [mailto:cctec@yahoo.cn Eric], [mailto:cocurrent@gmail.com Bruce],[mailto:xfwebs@gmail.com 谢鹏],[mailto:wei.ouyang@gmail.com Wei Ouyang],[mailto:gj@tstc.org.cn 谷杰],[mailto:alw2000@hotmail.com Dragon],[mailto:haoming76@gmail.com 郝明], 程芃苏, [mailto:zhangjingchao@yapulan.com Chester Zhang], [mailto:aleliu6@gmail.com Ale], [mailto:jimmy@imperva.com jimmy], [mailto:david@webutm.com daivid Chuh], [mailto:wsguor@163.com 非零解], [mailto:dhlduda@yahoo.com.cn linan], [mailto:jackey.zhang.cn@gmail.com Jackey], [mailto:kk0915@gmail.com clider yuan], [mailto:wy2000@gmail.com Jorward], [mailto:hwang@fortify.com Hong Wang], [mailto:firefox.fst@gmail.com FireFox], [mailto:kevin@80sec.com 凯文], [mailto:2747658@qq.com Tinysxing], [mailto:amxku@msn.com amxku], [mailto:erlv5241@gmail.com erlv], [mailto:shenxianbeibei@gmail.com Mathacker Math], [mailto:sean@attomsoft.com Sean Walker], [mailto:sailer.shen@gmail.com sailer shen], [mailto:zhangelsu@gmail.com Pengyu Zhang],[mailto:hyddd@163.com Hyddd], [mailto:everyday1700@hotmail.com 刘辉], [mailto:lee_otto@hotmail.com Otto Lee], [mailto:yujian@venustech.com.cn 于舰], [mailto:shadow@x3y3.org 张晨],[mailto:toqinbo@gmail.com 秦波]， [mailto:flood_linux@163.com Steve Huang]， [mailto:itisarandomname@gmail.com Darkness]， [mailto:bluezhao@nanhai.gd.cn bluezhao]， [mailto:zhwy2000@gmail.com zhang wenyi]， [mailto:aenjoy@gmail.com 殷钧钧]， [mailto:lyt19823027@sina.com 刘猷韬]， [mailto:fei_zou@trendmicro.com.cn 邹飞]， [mailto:hustmen@hotmail.com Bruce Liu]， [mailto:websuperboy@163.com Seraph Nie]， [mailto:qiulihong@gmail.com 邱立宏]， [mailto:weijia_huang@sohu.com 黄炜珈]， [mailto:docwang51@gmail.com docwang51]， [mailto:zigaoliu@hotmail.com 刘自高]， [mailto:frankljq@hotmail.com Jason Lin]， [mailto:newweapon111@gmail.com Liu Weiping]， [mailto:yuanfan_163@163.com 远帆]， [mailto:chenp@beijingit.gov.cn 陈萍]， [mailto:manager@chencunli.cn 陈存利]， [mailto:icuc88@yahoo.com Eric Zhong]， [mailto:liukes@ln.chinamobile.com 刘可]， [mailto:liweim@163.com munix]， [mailto:pentest@live.cn L7]， [mailto:Xuanxh@asiainfo.com 轩晓荷]， [mailto:lily8669@126.com 王一一]， [mailto:tinonetwork@gmail.com Tino Wang]， [mailto:hackwoman1977@gmail.com Richard.liu]， [mailto:oldlary@yahoo.com.cn 李建军]， [mailto:fanjunfj@cn.ibm.com 范俊]， [mailto:248690968@qq.com tony_liu518]， [mailto:jack.zhang@digobtain.com.cn Jack]， [mailto:linuxrootkit2008@gmail.com 杨宁]， [mailto:max.chen.c@gmail.com Max Chen], [mailto:qiu.danny@gmail.com Danny Qiu],[mailto:shiyun24@163.com 石云], [mailto:Kryson@CISRG.com Kryson], [mailto:qzjqh567@sina.com 曲志军], [mailto:itsecurity@163.com Amu], [mailto:libo.swust@gmail.com 李波]， [mailto:jingjing_echo@hotmail.com Jing Zhang]， [mailto:reject.wl@gmail.com 魏力]， [mailto:fonix@sohu.com Fonix Li]，[mailto:tomtudos@126.com xiaomage]， [mailto:vincemong@163.com VinceMong]， [mailto:wqs8077@163.com wqs8077]， [mailto:jack.gao.ch@gmail.com 高广鹏]， [mailto:kun.liuk@alipay.com 刘坤]， [mailto:Coolc@qq.com coolcyang]， [mailto:jupiterhyun@hotmail.com jupiterhyun]， [mailto:yuanxd@hotmail.com Xiaodong Yuan]， [mailto:curthan2002@sina.com curthan]， [mailto:fanfox7405@163.com 樊山]， [mailto:mr.zhaoxiang@gmail.com zhao xiang]， [mailto:J.Wang3@lboro.ac.uk Jie Wang]， [mailto:donglibo5252@163.com donglibo5252]， [mailto:xqdong@ctrip.com vdxq董晓琼]， [mailto:jean_he@trendmicro.com.cn jean_he]， [mailto:weizhunsun@163.com weizhunsun]， [mailto:aliceraul@gmail.com Alice]， [mailto:xingly@nipc.org.cn 邢璐祎]， [mailto:minemys@gmail.com 马玉书]， [mailto:yao_zhiwu@hotmail.com yao_zhiwu]， [mailto:zxin.nju@gmail.com Xin Zhi]， [mailto:55984512@qq.com 网路游侠]， [mailto:flying.kwok@gmail.com flying]， [mailto:omgwxl@163.com 王筱鎏]， [mailto:jeantoe@gmail.com 张逸群]， [mailto:tzsm11@qq.com 黑海洋]， [mailto:mr.linuxer@live.cn 無材]， [mailto:zhengm04@mails.tsinghua.edu.cn 郑明]， [mailto:flood_linux@163.com Steve Huang]， [mailto:cool_h2o@163.com victor]， [mailto:l3n6m0@yahoo.com 陈诚]， [mailto:joinbaijun@gmail.com 白峻]， [mailto:dreamice.jiang@gmail.com 江均勇]， [mailto:gmwshz@gmail.com 纯色]， [mailto:ideq0x1@gmail.com 李宁]， [mailto:yangbo9297@qq.com yangbo]， [mailto:linxinsnow@163.com linxinsnow]， [mailto:powerosso@powerosso.com 李宁]， [mailto:advancesun@163.com 孙歆]， [mailto:ntpcn@yahoo.cn 王蒙]， [mailto:cabjdp@gmail.com Waterwave]， [mailto:qiejunli@gmail.com 郄军利]， [mailto:ellle@qq.com ellle]， [mailto:chengyu80@163.com 程渝]， [mailto:jiuchuanlin@Hotmail.com jiuchuan lin]， [mailto:wjphero@163.com 吴金鹏]， [mailto:provisional@163.com 小秦]， [mailto:421010182@qq.com 李锦华]， [mailto:jiangzengzeng@ec.com.cn 蒋增增]， [mailto:22018188@qq.com 吴新]， [mailto:lightlan@msn.com 02zhou]， [mailto:kanava88@gmail.com FangZheng Hu]， [mailto:gaojun55@gmail.com J.gao]， [mailto:liuchen1987323@yahoo.com.cn 刘辰]， [mailto:dllhlx@gmail.com dllhlx]， &lt;br /&gt;
&lt;br /&gt;
[[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP%E4%B8%AD%E6%96%87%E9%A1%B9%E7%9B%AE&amp;diff=130342</id>
		<title>OWASP中文项目</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP%E4%B8%AD%E6%96%87%E9%A1%B9%E7%9B%AE&amp;diff=130342"/>
				<updated>2012-05-23T03:19:00Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* 已完成的项目 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Click [http://www.owasp.org/index.php/OWASP_Chinese_Project Here] into English Page''' &lt;br /&gt;
&lt;br /&gt;
''' 点击[http://www.owasp.org/index.php?title=OWASP%E4%B8%AD%E6%96%87%E9%A1%B9%E7%9B%AE 这里]进入中文网页''' &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''项目介绍'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''项目名称''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP中文项目'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''项目任务''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 与OWASP相关的华语分部、华语安全公司以及华语大学共同合作，将OWASP的信息传播到华语安全社团，并鼓励越来越多的华人安全专家和工程师加入到OWASP。&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Email联系''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 项目领导人&amp;lt;br&amp;gt;[mailto:wangjie8578(at)yahoo.com.cn 王颉]&amp;lt;br&amp;gt;[mailto:wengaous(at)gmail.com 高雯]&amp;lt;br&amp;gt;[mailto:weilin.zhong@owasp.org 钟卫林]&amp;lt;br&amp;gt;[mailto:ivy@owasp.org.cn 张平]&amp;lt;br&amp;gt;[mailto:rip@owasp.org.cn Rip Torn]  &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 项目参与人员&amp;lt;br&amp;gt;[mailto:chenhj@sinosoft.com.cn 陈海杰]&amp;lt;br&amp;gt;[mailto:ericchio@microsoft.com 趙嘉言] &amp;lt;br&amp;gt;[mailto:guoyan@ustc.edu.cn 郭燕] &amp;lt;br&amp;gt;[mailto:kongvita@126.com 孔庆斌] &amp;lt;br&amp;gt;[mailto:racsowang@gmail.com Yitao Wang] &amp;lt;br&amp;gt;[mailto:yao_zhiwu@hotmail.com Zhiwu Yao] &amp;lt;br&amp;gt;[mailto:ggfish@gmail.com 于振东] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | [https://lists.owasp.org/mailman/admin/owasp-chinese 邮件列表/加入] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 第一审核人员&amp;lt;br&amp;gt;[mailto:wangjie8578(at)yahoo.com.cn 王颉]&amp;lt;br&amp;gt;[mailto:rip@owasp.org.cn Rip Torn]&amp;lt;br&amp;gt;我们需要更多的审核人员！ &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 第二审核人员&amp;lt;br&amp;gt;[mailto:wangjie8578(at)yahoo.com.cn 王颉]&amp;lt;br&amp;gt;[mailto:rip@owasp.org.cn Rip Torn]&amp;lt;br&amp;gt;我们需要更多的审核人员！ &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP董事会成员&amp;lt;br&amp;gt;'''X'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''目前进行项目的链接'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model OWASP SAMM] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Java项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project_.NET OWASP AntiSamy .NET项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API (ESAPI)项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD项目]&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''相关项目和OWASP分部'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
[[:OWASP Internationalization|OWASP国际化项目]] &amp;lt;br&amp;gt;[http://www.owasp.org/index.php/China-Mainland 中国大陆地区分部;] [http://www.owasp.org/index.php/Hong_Kong 香港地区分部;] [http://www.owasp.org/index.php/Singapore 新加坡分部;] [http://www.owasp.org/index.php/OWASP_Taiwan_Translation_temporary_page 台湾地区分部] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''赞助 &amp;amp; 指导''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|评估标准&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[http://www.owasp.org/index.php/Assessment_Criteria_v2.0 OWASP 评估标准（v2.0）]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/%E9%A1%B9%E7%9B%AE%E5%8F%91%E5%B8%83%E8%AF%84%E4%BC%B0 中文版OWASP 评估标准（v2.0） ]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== 新近开始的项目（项目成员招收中）  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Java项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project_.NET OWASP AntiSamy .NET项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API (ESAPI)项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD项目]&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
* WAF测试基准项目(OWASP Web应用防火墙认证)&lt;br /&gt;
* Webscan验证平台项目&lt;br /&gt;
* OWASP风险评级方法&lt;br /&gt;
&lt;br /&gt;
== 正在进行的项目  ==&lt;br /&gt;
最新项目进展情况请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model OWASP SAMM]&lt;br /&gt;
&lt;br /&gt;
#目前进展： 处于[http://www-staff.lboro.ac.uk/~cojw8/index.htm 作者]的自我审核阶段。预期自我审核结束时间：2011年4月底。 &lt;br /&gt;
#参与人员列表：[mailto:wangjie8578@yahoo.com.cn Jie Wang], Yitao Wang, [mailto:chunyanwei@gmail.com Lisa Wei]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
&lt;br /&gt;
#目前进展：内部自我审核阶段&lt;br /&gt;
#参与人员列表：[mailto:hu_xbin@owasp.org.cn hu_xbin], [mailto:redbad2@163.com redbad2], [mailto:trenthyh@gmail.com trenthy],[mailto:leizhangwang8023@126.com leizhangwang],[mailto:dengwei@foxmail.com crazyman],[mailto:jupiterhyun@hotmail.com 牟欣]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API (ESAPI)项目]&lt;br /&gt;
&lt;br /&gt;
#目前进展：召集第一审核人员&lt;br /&gt;
#参与人员列表：[mailto:racsowang@gmail.com Yitao Wang], [mailto:stwu46@163.com 吴朝花],[mailto:lyp20062392@gmail.com Yuping Li]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Java项目]&lt;br /&gt;
#目前进展：处于技术验证阶段&lt;br /&gt;
#参与人员列表：[mailto:Joey.Yin@activenetwork.com Joey Yin], [mailto:shanda.wang@gmail.com 王文君], [mailto:ntqlgx@163.com 倪彤前],[mailto:fanfox7405@163.com 樊山],&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project_.NET OWASP AntiSamy .NET项目] &lt;br /&gt;
#目前进展：处于第一审核阶段,召集审核人员。&lt;br /&gt;
#参与人员列表：[mailto:Joey.Yin@activenetwork.com Joey Yin], [mailto:zlt004@126.com zlty], [mailto:zpino@126.com 张平]，[mailto:lxk613@163.com 梁兴开]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD项目]&lt;br /&gt;
#目前进展：技术验证阶段&lt;br /&gt;
#参与人员列表： [mailto:cisp3000@sina.com 杨天识], [mailto:akast@ngsst.com akast]，[mailto:zhihe.ru@gmail.com Roy]，[mailto:racsowang@gmail.com Yitao Wang], [mailto:azone@ngsst.com Azone]， [mailto:bite@ngsst.com Bite]&lt;br /&gt;
&lt;br /&gt;
*WAF测试基准项目&lt;br /&gt;
&lt;br /&gt;
#目前进展：开始阶段&lt;br /&gt;
#参与人员列表：[mailto:chenhj@sinosoft.com.cn 陈海杰]，[mailto:bob.yang@dbappsecurity.com.cn 杨勃]，[mailto:toqinbo@gmail.com 秦波]，[mailto:fumin1900@yahoo.com.cn 付敏]，[mailto:sun_yangbo@venustech.com.cn 孙阳波]，[mailto:xu_liguang@venustech.com.cn 许立广]，[mailto:huang_yuhong@venustech.com.cn 黄宇鸿]，[mailto:zhang_yuanli@venustech.com.cn 张元立]，[mailto:yao_yanliang@venustech.com.cn 姚燕良]，[mailto:songrui@venustech.com.cn 宋锐]&lt;br /&gt;
&lt;br /&gt;
*Webscan验证平台项目&lt;br /&gt;
&lt;br /&gt;
#目前进展：开始阶段，召集大家参与&lt;br /&gt;
#参与人员列表：[mailto:kk0915@gmail.com 袁明坤]，[mailto:cisp3000@sina.com 杨天识]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology OWASP风险评级方法]&lt;br /&gt;
&lt;br /&gt;
#目前进展：开始阶段，召集大家参与&lt;br /&gt;
#参与人员列表：[mailto:wutian513@gmail.com 李天武]，[mailto:zhihe.ru@gmail.com Roy]&lt;br /&gt;
&lt;br /&gt;
==采用的项目评估标准==&lt;br /&gt;
为保证项目的质量，我们采用了最新的[http://www.owasp.org/index.php/Assessment_Criteria_v2.0 OWASP评估标准（v2.0）]，在项目发布以前对项目的工具和文档进行评估。欲了解相关的中文信息，请点击以下选项。&lt;br /&gt;
*[http://www.owasp.org/index.php/%E9%A1%B9%E7%9B%AE%E5%8F%91%E5%B8%83%E8%AF%84%E4%BC%B0 项目发布评估]&lt;br /&gt;
*[http://www.owasp.org/index.php/%E5%B7%A5%E5%85%B7%E8%AF%84%E4%BC%B0%E6%A0%87%E5%87%86 工具评估标准]&lt;br /&gt;
*[http://www.owasp.org/index.php/%E6%96%87%E6%A1%A3%E8%AF%84%E4%BC%B0%E6%A0%87%E5%87%86 文档评估标准]&lt;br /&gt;
&lt;br /&gt;
== 已完成的项目  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010年OWASP Top 10项目] &lt;br /&gt;
*[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf OWASP测试指南项目]&lt;br /&gt;
*[OWASP Web应用防火墙认证]&lt;br /&gt;
&lt;br /&gt;
== 2011年正在进行的活动  ==&lt;br /&gt;
&lt;br /&gt;
*组织2011年OWASP中国会议。 &lt;br /&gt;
*在OWASP的网页中添加中文支持。 &lt;br /&gt;
*吸引香港地区分部、新加坡分部、台湾地区分部以及其他分部参加该计划。 &lt;br /&gt;
*确定重要的OWASP文档和项目，并将其翻译为中文。 &lt;br /&gt;
*在美国、中国和其他国家地区招收团队成员。 &lt;br /&gt;
*翻译最新的OWASP新闻简报。&lt;br /&gt;
&lt;br /&gt;
== 2010年已完成的活动  ==&lt;br /&gt;
&lt;br /&gt;
*组织了[http://www.owasp.org/index.php/OWASP_China_Summit_2010 2010年OWASP中国峰会]。 &lt;br /&gt;
*翻译并发布了2010年版本的OWASP Top 10。 &lt;br /&gt;
*翻译了2010年所有的[http://www.owasp.org/index.php/Category:OWASP_Newsletter#tab=Newsletters OWASP新闻简报]。&lt;br /&gt;
&lt;br /&gt;
== 联系我们  ==&lt;br /&gt;
&lt;br /&gt;
如果您有兴趣加入OWASP中文项目组贡献您的一份力量,请联系各项目组长:&lt;br /&gt;
*[mailto:wengaous(at)gmail.com Helen Gao 高雯]&lt;br /&gt;
*[mailto:wangjie8578(at)yahoo.com.cn Jie Wang 王颉]&lt;br /&gt;
*[mailto:weilin.zhong@owasp.org Welin Zhong钟卫林]&lt;br /&gt;
*[mailto:project@owasp.org.cn Rip Torn]&lt;br /&gt;
&lt;br /&gt;
== 邮件列表  ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/admin/owasp-chinese 欢迎订阅] &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP%E4%B8%AD%E6%96%87%E9%A1%B9%E7%9B%AE&amp;diff=130341</id>
		<title>OWASP中文项目</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP%E4%B8%AD%E6%96%87%E9%A1%B9%E7%9B%AE&amp;diff=130341"/>
				<updated>2012-05-23T03:17:56Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* 新近开始的项目（项目成员招收中） */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Click [http://www.owasp.org/index.php/OWASP_Chinese_Project Here] into English Page''' &lt;br /&gt;
&lt;br /&gt;
''' 点击[http://www.owasp.org/index.php?title=OWASP%E4%B8%AD%E6%96%87%E9%A1%B9%E7%9B%AE 这里]进入中文网页''' &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''项目介绍'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''项目名称''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP中文项目'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''项目任务''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 与OWASP相关的华语分部、华语安全公司以及华语大学共同合作，将OWASP的信息传播到华语安全社团，并鼓励越来越多的华人安全专家和工程师加入到OWASP。&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Email联系''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 项目领导人&amp;lt;br&amp;gt;[mailto:wangjie8578(at)yahoo.com.cn 王颉]&amp;lt;br&amp;gt;[mailto:wengaous(at)gmail.com 高雯]&amp;lt;br&amp;gt;[mailto:weilin.zhong@owasp.org 钟卫林]&amp;lt;br&amp;gt;[mailto:ivy@owasp.org.cn 张平]&amp;lt;br&amp;gt;[mailto:rip@owasp.org.cn Rip Torn]  &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 项目参与人员&amp;lt;br&amp;gt;[mailto:chenhj@sinosoft.com.cn 陈海杰]&amp;lt;br&amp;gt;[mailto:ericchio@microsoft.com 趙嘉言] &amp;lt;br&amp;gt;[mailto:guoyan@ustc.edu.cn 郭燕] &amp;lt;br&amp;gt;[mailto:kongvita@126.com 孔庆斌] &amp;lt;br&amp;gt;[mailto:racsowang@gmail.com Yitao Wang] &amp;lt;br&amp;gt;[mailto:yao_zhiwu@hotmail.com Zhiwu Yao] &amp;lt;br&amp;gt;[mailto:ggfish@gmail.com 于振东] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | [https://lists.owasp.org/mailman/admin/owasp-chinese 邮件列表/加入] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 第一审核人员&amp;lt;br&amp;gt;[mailto:wangjie8578(at)yahoo.com.cn 王颉]&amp;lt;br&amp;gt;[mailto:rip@owasp.org.cn Rip Torn]&amp;lt;br&amp;gt;我们需要更多的审核人员！ &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 14%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | 第二审核人员&amp;lt;br&amp;gt;[mailto:wangjie8578(at)yahoo.com.cn 王颉]&amp;lt;br&amp;gt;[mailto:rip@owasp.org.cn Rip Torn]&amp;lt;br&amp;gt;我们需要更多的审核人员！ &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP董事会成员&amp;lt;br&amp;gt;'''X'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''目前进行项目的链接'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model OWASP SAMM] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Java项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project_.NET OWASP AntiSamy .NET项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API (ESAPI)项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD项目]&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''相关项目和OWASP分部'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
[[:OWASP Internationalization|OWASP国际化项目]] &amp;lt;br&amp;gt;[http://www.owasp.org/index.php/China-Mainland 中国大陆地区分部;] [http://www.owasp.org/index.php/Hong_Kong 香港地区分部;] [http://www.owasp.org/index.php/Singapore 新加坡分部;] [http://www.owasp.org/index.php/OWASP_Taiwan_Translation_temporary_page 台湾地区分部] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''赞助 &amp;amp; 指导''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|评估标准&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[http://www.owasp.org/index.php/Assessment_Criteria_v2.0 OWASP 评估标准（v2.0）]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/%E9%A1%B9%E7%9B%AE%E5%8F%91%E5%B8%83%E8%AF%84%E4%BC%B0 中文版OWASP 评估标准（v2.0） ]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== 新近开始的项目（项目成员招收中）  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Java项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project_.NET OWASP AntiSamy .NET项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API (ESAPI)项目] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD项目]&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
* WAF测试基准项目(OWASP Web应用防火墙认证)&lt;br /&gt;
* Webscan验证平台项目&lt;br /&gt;
* OWASP风险评级方法&lt;br /&gt;
&lt;br /&gt;
== 正在进行的项目  ==&lt;br /&gt;
最新项目进展情况请查看OWASP中国网站： http://www.owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model OWASP SAMM]&lt;br /&gt;
&lt;br /&gt;
#目前进展： 处于[http://www-staff.lboro.ac.uk/~cojw8/index.htm 作者]的自我审核阶段。预期自我审核结束时间：2011年4月底。 &lt;br /&gt;
#参与人员列表：[mailto:wangjie8578@yahoo.com.cn Jie Wang], Yitao Wang, [mailto:chunyanwei@gmail.com Lisa Wei]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project OWASP Cloud ‐ 10 Project]&lt;br /&gt;
&lt;br /&gt;
#目前进展：内部自我审核阶段&lt;br /&gt;
#参与人员列表：[mailto:hu_xbin@owasp.org.cn hu_xbin], [mailto:redbad2@163.com redbad2], [mailto:trenthyh@gmail.com trenthy],[mailto:leizhangwang8023@126.com leizhangwang],[mailto:dengwei@foxmail.com crazyman],[mailto:jupiterhyun@hotmail.com 牟欣]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API OWASP Enterprise Security API (ESAPI)项目]&lt;br /&gt;
&lt;br /&gt;
#目前进展：召集第一审核人员&lt;br /&gt;
#参与人员列表：[mailto:racsowang@gmail.com Yitao Wang], [mailto:stwu46@163.com 吴朝花],[mailto:lyp20062392@gmail.com Yuping Li]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project OWASP AntiSamy Java项目]&lt;br /&gt;
#目前进展：处于技术验证阶段&lt;br /&gt;
#参与人员列表：[mailto:Joey.Yin@activenetwork.com Joey Yin], [mailto:shanda.wang@gmail.com 王文君], [mailto:ntqlgx@163.com 倪彤前],[mailto:fanfox7405@163.com 樊山],&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project_.NET OWASP AntiSamy .NET项目] &lt;br /&gt;
#目前进展：处于第一审核阶段,召集审核人员。&lt;br /&gt;
#参与人员列表：[mailto:Joey.Yin@activenetwork.com Joey Yin], [mailto:zlt004@126.com zlty], [mailto:zpino@126.com 张平]，[mailto:lxk613@163.com 梁兴开]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD项目]&lt;br /&gt;
#目前进展：技术验证阶段&lt;br /&gt;
#参与人员列表： [mailto:cisp3000@sina.com 杨天识], [mailto:akast@ngsst.com akast]，[mailto:zhihe.ru@gmail.com Roy]，[mailto:racsowang@gmail.com Yitao Wang], [mailto:azone@ngsst.com Azone]， [mailto:bite@ngsst.com Bite]&lt;br /&gt;
&lt;br /&gt;
*WAF测试基准项目&lt;br /&gt;
&lt;br /&gt;
#目前进展：开始阶段&lt;br /&gt;
#参与人员列表：[mailto:chenhj@sinosoft.com.cn 陈海杰]，[mailto:bob.yang@dbappsecurity.com.cn 杨勃]，[mailto:toqinbo@gmail.com 秦波]，[mailto:fumin1900@yahoo.com.cn 付敏]，[mailto:sun_yangbo@venustech.com.cn 孙阳波]，[mailto:xu_liguang@venustech.com.cn 许立广]，[mailto:huang_yuhong@venustech.com.cn 黄宇鸿]，[mailto:zhang_yuanli@venustech.com.cn 张元立]，[mailto:yao_yanliang@venustech.com.cn 姚燕良]，[mailto:songrui@venustech.com.cn 宋锐]&lt;br /&gt;
&lt;br /&gt;
*Webscan验证平台项目&lt;br /&gt;
&lt;br /&gt;
#目前进展：开始阶段，召集大家参与&lt;br /&gt;
#参与人员列表：[mailto:kk0915@gmail.com 袁明坤]，[mailto:cisp3000@sina.com 杨天识]&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology OWASP风险评级方法]&lt;br /&gt;
&lt;br /&gt;
#目前进展：开始阶段，召集大家参与&lt;br /&gt;
#参与人员列表：[mailto:wutian513@gmail.com 李天武]，[mailto:zhihe.ru@gmail.com Roy]&lt;br /&gt;
&lt;br /&gt;
==采用的项目评估标准==&lt;br /&gt;
为保证项目的质量，我们采用了最新的[http://www.owasp.org/index.php/Assessment_Criteria_v2.0 OWASP评估标准（v2.0）]，在项目发布以前对项目的工具和文档进行评估。欲了解相关的中文信息，请点击以下选项。&lt;br /&gt;
*[http://www.owasp.org/index.php/%E9%A1%B9%E7%9B%AE%E5%8F%91%E5%B8%83%E8%AF%84%E4%BC%B0 项目发布评估]&lt;br /&gt;
*[http://www.owasp.org/index.php/%E5%B7%A5%E5%85%B7%E8%AF%84%E4%BC%B0%E6%A0%87%E5%87%86 工具评估标准]&lt;br /&gt;
*[http://www.owasp.org/index.php/%E6%96%87%E6%A1%A3%E8%AF%84%E4%BC%B0%E6%A0%87%E5%87%86 文档评估标准]&lt;br /&gt;
&lt;br /&gt;
== 已完成的项目  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf 2010年OWASP Top 10项目] &lt;br /&gt;
*[http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf OWASP测试指南项目]&lt;br /&gt;
&lt;br /&gt;
== 2011年正在进行的活动  ==&lt;br /&gt;
&lt;br /&gt;
*组织2011年OWASP中国会议。 &lt;br /&gt;
*在OWASP的网页中添加中文支持。 &lt;br /&gt;
*吸引香港地区分部、新加坡分部、台湾地区分部以及其他分部参加该计划。 &lt;br /&gt;
*确定重要的OWASP文档和项目，并将其翻译为中文。 &lt;br /&gt;
*在美国、中国和其他国家地区招收团队成员。 &lt;br /&gt;
*翻译最新的OWASP新闻简报。&lt;br /&gt;
&lt;br /&gt;
== 2010年已完成的活动  ==&lt;br /&gt;
&lt;br /&gt;
*组织了[http://www.owasp.org/index.php/OWASP_China_Summit_2010 2010年OWASP中国峰会]。 &lt;br /&gt;
*翻译并发布了2010年版本的OWASP Top 10。 &lt;br /&gt;
*翻译了2010年所有的[http://www.owasp.org/index.php/Category:OWASP_Newsletter#tab=Newsletters OWASP新闻简报]。&lt;br /&gt;
&lt;br /&gt;
== 联系我们  ==&lt;br /&gt;
&lt;br /&gt;
如果您有兴趣加入OWASP中文项目组贡献您的一份力量,请联系各项目组长:&lt;br /&gt;
*[mailto:wengaous(at)gmail.com Helen Gao 高雯]&lt;br /&gt;
*[mailto:wangjie8578(at)yahoo.com.cn Jie Wang 王颉]&lt;br /&gt;
*[mailto:weilin.zhong@owasp.org Welin Zhong钟卫林]&lt;br /&gt;
*[mailto:project@owasp.org.cn Rip Torn]&lt;br /&gt;
&lt;br /&gt;
== 邮件列表  ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/admin/owasp-chinese 欢迎订阅] &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_15&amp;diff=121142</id>
		<title>Global Industry Committee - Application 15</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_15&amp;diff=121142"/>
				<updated>2011-12-06T01:34:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #4058a0; color: white&amp;quot; colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: #7b8abd&amp;quot; align=&amp;quot;center&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: #cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;Frank Fan&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: #7b8abd&amp;quot; align=&amp;quot;center&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: #cccccc&amp;quot; align=&amp;quot;left&amp;quot; | OWASP China VP&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: #7b8abd&amp;quot; align=&amp;quot;center&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: #cccccc&amp;quot; align=&amp;quot;left&amp;quot; | Global Industry Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #4058a0; color: white&amp;quot; colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: white; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''1''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Helen Gao &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Long Island Chapter Founder &amp;amp;amp; Leader, Global Membership Comittee &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | I first met Frank at the OWASP conference in 2010. Frank is one of the most intelligent entrepreneurs and infosec experts I have ever met. Frank's company has been one of the main sponsors of the past two OWASP conferences in China. As a matter of fact, Frank has volunteered to host the OWASP submit in 2013. Frank's education and experience in both US and China is rare, especially among OWASP leaders. I am confident that he will be an asset to OWASP.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''2''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Ivy Zhang &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Member of China Chapter &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Being the VP of China Chapter, Frank also has more than ten years experience in US. His experience and knowledge is crucial in OWASP's mission&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''3''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Tin Zaw &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Los Angeles Chapter Leader &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Frank is a highly-respected, well-connected, successful engineer/businessman in China and he is very committed to success of OWASP, in China and globally. These attributes make him an ideal candidate for the Industry Committee.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''4''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Weilin Zhong &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Lead of Top 10 Chinese Project &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | I worked with Frank for the OWASP China Summit 2010 hosted in Beijing. He was one of the key members of the summit organization committee and the local host. Frank was not only a security expert but also a security entrepreneur with rich understanding of both the American and the Chinese security industries and communities. He is resourceful and well-connected. He provided great support for the summit and showed strong commitment of promoting both OWASP and application security in the China and Asian areas. His unique combination of US and Chinese education backgrounds, industrial experiences and leaderships positions him well for prompting OWASP in a global level and connecting to international communities . I am sure he will be a great asset for OWASP.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''5''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | rip&lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Owasp china chapter founder &amp;amp;amp;&amp;amp;nbsp; leader&lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Support Frank,&amp;amp;nbsp; Hope to devote more time to promote the development of Owasp china.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_9&amp;diff=120351</id>
		<title>Global Chapter Committee - Application 9</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_9&amp;diff=120351"/>
				<updated>2011-11-17T06:11:24Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #4058a0; color: white&amp;quot; colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: #7b8abd&amp;quot; align=&amp;quot;center&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: #cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;Ivy Zhang&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: #7b8abd&amp;quot; align=&amp;quot;center&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: #cccccc&amp;quot; align=&amp;quot;left&amp;quot; | OWASP&amp;amp;nbsp;China Member&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: #7b8abd&amp;quot; align=&amp;quot;center&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: #cccccc&amp;quot; align=&amp;quot;left&amp;quot; | Global Chapter Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #4058a0; color: white&amp;quot; colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: white; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''1''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | rip &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | owasp china president &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Support&amp;amp;nbsp;Ivy, she has done very&amp;amp;nbsp;well&amp;amp;nbsp;in OWASP APPSEC ASIA 2011 .&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''2''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''3''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''4''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''5''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_9&amp;diff=120350</id>
		<title>Global Chapter Committee - Application 9</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_9&amp;diff=120350"/>
				<updated>2011-11-17T06:10:02Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #4058a0; color: white&amp;quot; colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: #7b8abd&amp;quot; align=&amp;quot;center&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: #cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;Ivy Zhang&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: #7b8abd&amp;quot; align=&amp;quot;center&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: #cccccc&amp;quot; align=&amp;quot;left&amp;quot; | OWASP&amp;amp;nbsp;China Member&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: #7b8abd&amp;quot; align=&amp;quot;center&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: #cccccc&amp;quot; align=&amp;quot;left&amp;quot; | Global Chapter Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #4058a0; color: white&amp;quot; colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: white; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''1''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | rip&lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | owasp china president&lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Support&amp;amp;nbsp;Ivy, she has done very&amp;amp;nbsp;well at OWASP APPSEC ASIA 2011 .&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''2''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''3''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''4''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''5''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 20%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width: 57%; background: #cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119746</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119746"/>
				<updated>2011-11-02T11:22:03Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* November 8th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
In Surname's Alphabetical Order&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c9/Jianmli.jpg&lt;br /&gt;
| Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/07/Marco-morana.JPG&lt;br /&gt;
| Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/e/ef/Yumingxia.png &lt;br /&gt;
| Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/8/81/NoaBarYosef.jpg &lt;br /&gt;
| Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;t FCK__ShowTableBorders&amp;quot; width=&amp;quot;80%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Rip, OWASP China (Language: Chinese)'''&amp;lt;br&amp;gt;Opening Ceremony: Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt;Opening Ceremony&amp;amp;nbsp; '''(Language: English)'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Liping Ding &amp;amp;nbsp;(Language: Chinese) '''&amp;lt;br&amp;gt;The Analysis of Hidden Communication Channels within Cloud Computing Environment&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Manoranjan Paul &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Silver Lining in Dark Clouds: A Look at Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Frank Fan &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Jonathan Werrett&amp;amp;nbsp; (Language: English)'''&amp;lt;br&amp;gt;WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Hanqing Wu&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch &amp;amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Cassio Goldschmidt'&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; (Language: English)&amp;lt;br&amp;gt;'''The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:10 – 15:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Yuming Xia&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Web2.0 Secure Coding Practice&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 – 16:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Marco M. Morana &amp;amp;amp; Wei Zhang&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 – 16:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Chenxi Liu&amp;amp;nbsp;&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Security is Service&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:40 – 17:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Noa Bar Yosef&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Hacking 2011：Lesson for 2012&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:10 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;t FCK__ShowTableBorders&amp;quot; width=&amp;quot;80%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Wenju Wang&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Larry Man&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Daniel Ng&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Beefing up Cloud Application through Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Dr. Meng-Chow Kang&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Overview of ISO/IEC 27034 - the Application Security Standards&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Jianmeng Li (Language: Chinese)'''&amp;lt;br&amp;gt;Secure C Function: The Lightweight Solution for Buffer Overflow&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Langyu Hu (Language: Chinese)'''&amp;lt;br&amp;gt;RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 15:00 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch &amp;amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Chenming Zhong (Language: Chinese)'''&amp;lt;br&amp;gt;Overview of Website Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Tony (Language: Chinese)'''&amp;lt;br&amp;gt;2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 16:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | Lucky Draw&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:15 – 16:45 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Yongbo Liu (Language: Chinese)'''&amp;lt;br&amp;gt;The Challenges of China's Post Information Security Era&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:45 – 17:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Dr. Jianchun Jiang (Language: Chinese)&amp;lt;br&amp;gt;NSACE - The Network Security Capability Oriented Training and Certificates'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:15 – 17:45 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;Future Plan of OWASP China and Release of WAF Testing Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tony''' &amp;lt;br&amp;gt; Application Security Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.huaweisymantec.com/cn/|logo=HS.jpg}} {{MemberLinks|link=http://www.yxlink.com/|logo=Yxlink.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Training Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Supported Organizations:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2_logo.jpg}} {{MemberLinks|link=http://www.nsace.org.cn/|logo=NSACE.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Exhibitors:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Cooperators:'''  &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://aiscanner.sinaapp.com/site/|logo=Aiscanner.png}} {{MemberLinks|link=http://www.broadview.com.cn/|logo=Broadview.jpg}} &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}  &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}{{MemberLinks|link=http://www.zdnet.com.cn/|logo=Zdnet.gif‎}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=Xinxianquanyujishu.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119745</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119745"/>
				<updated>2011-11-02T11:18:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
In Surname's Alphabetical Order&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c9/Jianmli.jpg&lt;br /&gt;
| Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/07/Marco-morana.JPG&lt;br /&gt;
| Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/e/ef/Yumingxia.png &lt;br /&gt;
| Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/8/81/NoaBarYosef.jpg &lt;br /&gt;
| Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;t FCK__ShowTableBorders&amp;quot; width=&amp;quot;80%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Rip, OWASP China (Language: Chinese)'''&amp;lt;br&amp;gt;Opening Ceremony: Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt;Opening Ceremony&amp;amp;nbsp; '''(Language: English)'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Liping Ding &amp;amp;nbsp;(Language: Chinese) '''&amp;lt;br&amp;gt;The Analysis of Hidden Communication Channels within Cloud Computing Environment&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Manoranjan Paul &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Silver Lining in Dark Clouds: A Look at Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Frank Fan &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Jonathan Werrett&amp;amp;nbsp; (Language: English)'''&amp;lt;br&amp;gt;WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Hanqing Wu&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch &amp;amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Cassio Goldschmidt'&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; (Language: English)&amp;lt;br&amp;gt;'''The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:10 – 15:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Yuming Xia&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Web2.0 Secure Coding Practice&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 – 16:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Marco M. Morana &amp;amp;amp; Wei Zhang&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 – 16:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Chenxi Liu&amp;amp;nbsp;&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Security is Service&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:40 – 17:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Noa Bar Yosef&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Hacking 2011：Lesson for 2012&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:10 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;t FCK__ShowTableBorders&amp;quot; width=&amp;quot;80%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Wenju Wang&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Larry Man&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Daniel Ng&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Beefing up Cloud Application through Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Dr. Meng-Chow Kang&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Overview of ISO/IEC 27034 - the Application Security Standards&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Jianmeng Li (Language: Chinese)'''&amp;lt;br&amp;gt;Secure C Function: The Lightweight Solution for Buffer Overflow&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Langyu Hu (Language: Chinese)'''&amp;lt;br&amp;gt;RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 15:00 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch &amp;amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Chenming Zhong (Language: Chinese)'''&amp;lt;br&amp;gt;Overview of Website Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Tony (Language: Chinese)'''&amp;lt;br&amp;gt;2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 16:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | Lucky Draw&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:15 – 16:45 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Yongbo Liu (Language: Chinese)'''&amp;lt;br&amp;gt;The Challenges of China's Post Information Security Era&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:45 – 17:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Dr. Jianchun Jiang (Language: Chinese)&amp;lt;br&amp;gt;NSACE - The Network Security Capability Oriented Training and Certificates'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:15 – 17:45 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;Future Plan of OWASP China and Release of WAF Testing Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tony''' &amp;lt;br&amp;gt; Application Security Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.huaweisymantec.com/cn/|logo=HS.jpg}} {{MemberLinks|link=http://www.yxlink.com/|logo=Yxlink.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Training Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Supported Organizations:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2_logo.jpg}} {{MemberLinks|link=http://www.nsace.org.cn/|logo=NSACE.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Exhibitors:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Cooperators:'''  &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://aiscanner.sinaapp.com/site/|logo=Aiscanner.png}} {{MemberLinks|link=http://www.broadview.com.cn/|logo=Broadview.jpg}} &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}  &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}{{MemberLinks|link=http://www.zdnet.com.cn/|logo=Zdnet.gif‎}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=Xinxianquanyujishu.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119744</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119744"/>
				<updated>2011-11-02T11:13:54Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
In Surname's Alphabetical Order&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c9/Jianmli.jpg&lt;br /&gt;
| Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/07/Marco-morana.JPG&lt;br /&gt;
| Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/e/ef/Yumingxia.png &lt;br /&gt;
| Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/8/81/NoaBarYosef.jpg &lt;br /&gt;
| Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;t FCK__ShowTableBorders&amp;quot; width=&amp;quot;80%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Rip, OWASP China (Language: Chinese)'''&amp;lt;br&amp;gt;Opening Ceremony: Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt;Opening Ceremony&amp;amp;nbsp; '''(Language: English)'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Liping Ding &amp;amp;nbsp;(Language: Chinese) '''&amp;lt;br&amp;gt;The Analysis of Hidden Communication Channels within Cloud Computing Environment&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Manoranjan Paul &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Silver Lining in Dark Clouds: A Look at Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Frank Fan &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Jonathan Werrett&amp;amp;nbsp; (Language: English)'''&amp;lt;br&amp;gt;WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Hanqing Wu&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch &amp;amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Cassio Goldschmidt'&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; (Language: English)&amp;lt;br&amp;gt;'''The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:10 – 15:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Yuming Xia&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Web2.0 Secure Coding Practice&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 – 16:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Marco M. Morana &amp;amp;amp; Wei Zhang&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 – 16:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Chenxi Liu&amp;amp;nbsp;&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Security is Service&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:40 – 17:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Noa Bar Yosef&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Hacking 2011：Lesson for 2012&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:10 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; Beefing up Cloud Application through Genetic Network Coding &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Dr. Meng-Chow Kang'''&amp;lt;br&amp;gt; Overview of ISO/IEC 27034 - the Application Security Standards&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Chenming Zhong'''&amp;lt;br&amp;gt;Overview of Website Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 16:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Lucky Draw&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:15 – 16:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Yongbo Liu'''&amp;lt;br&amp;gt; The Challenges of China's Post Information Security Era&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:45 – 17:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Dr. Jianchun Jiang'‘’ &amp;lt;br&amp;gt; NSACE - The Network Security Capability Oriented Training and Certificates&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:15 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;Future Plan of OWASP China and Release of WAF Testing Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tony''' &amp;lt;br&amp;gt; Application Security Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.huaweisymantec.com/cn/|logo=HS.jpg}} {{MemberLinks|link=http://www.yxlink.com/|logo=Yxlink.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Training Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Supported Organizations:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2_logo.jpg}} {{MemberLinks|link=http://www.nsace.org.cn/|logo=NSACE.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Exhibitors:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Cooperators:'''  &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://aiscanner.sinaapp.com/site/|logo=Aiscanner.png}} {{MemberLinks|link=http://www.broadview.com.cn/|logo=Broadview.jpg}} &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}  &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}{{MemberLinks|link=http://www.zdnet.com.cn/|logo=Zdnet.gif‎}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=Xinxianquanyujishu.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119743</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119743"/>
				<updated>2011-11-02T11:11:31Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
In Surname's Alphabetical Order&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c9/Jianmli.jpg&lt;br /&gt;
| Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/07/Marco-morana.JPG&lt;br /&gt;
| Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/e/ef/Yumingxia.png &lt;br /&gt;
| Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/8/81/NoaBarYosef.jpg &lt;br /&gt;
| Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;t FCK__ShowTableBorders&amp;quot; width=&amp;quot;80%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;center&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Rip, OWASP China (Language: Chinese)'''&amp;lt;br&amp;gt;Opening Ceremony: Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt;Opening Ceremony&amp;amp;nbsp; '''(Language: English)'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Liping Ding &amp;amp;nbsp;(Language: Chinese) '''&amp;lt;br&amp;gt;The Analysis of Hidden Communication Channels within Cloud Computing Environment&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Manoranjan Paul &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Silver Lining in Dark Clouds: A Look at Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Frank Fan &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Jonathan Werrett&amp;amp;nbsp; (Language: English)'''&amp;lt;br&amp;gt;WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Hanqing Wu&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;17&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch &amp;amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Cassio Goldschmidt'&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; (Language: English)&amp;lt;br&amp;gt;'''The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:10 – 15:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Yuming Xia&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;Web2.0 Secure Coding Practice&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 – 16:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Marco M. Morana &amp;amp;amp; Wei Zhang&amp;amp;nbsp; &amp;amp;nbsp;(Language: Chinese)'''&amp;lt;br&amp;gt;The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 – 16:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | '''Chenxi Liu&amp;amp;nbsp;&amp;amp;nbsp; (Language: Chinese)'''&amp;lt;br&amp;gt;Security is Service&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 16:40 – 17:10 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;center&amp;quot; | '''Noa Bar Yosef&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp;(Language: English)'''&amp;lt;br&amp;gt;Hacking 2011：Lesson for 2012&lt;br /&gt;
|-&lt;br /&gt;
| height=&amp;quot;49&amp;quot; width=&amp;quot;14%&amp;quot; align=&amp;quot;right&amp;quot; | 17:10 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;center&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;amp;lt;/center&amp;amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; Beefing up Cloud Application through Genetic Network Coding &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Dr. Meng-Chow Kang'''&amp;lt;br&amp;gt; Overview of ISO/IEC 27034 - the Application Security Standards&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Chenming Zhong'''&amp;lt;br&amp;gt;Overview of Website Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 16:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Lucky Draw&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:15 – 16:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Yongbo Liu'''&amp;lt;br&amp;gt; The Challenges of China's Post Information Security Era&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:45 – 17:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Dr. Jianchun Jiang'‘’ &amp;lt;br&amp;gt; NSACE - The Network Security Capability Oriented Training and Certificates&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:15 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;Future Plan of OWASP China and Release of WAF Testing Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tony''' &amp;lt;br&amp;gt; Application Security Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.huaweisymantec.com/cn/|logo=HS.jpg}} {{MemberLinks|link=http://www.yxlink.com/|logo=Yxlink.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Training Sponsor:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Supported Organizations:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2_logo.jpg}} {{MemberLinks|link=http://www.nsace.org.cn/|logo=NSACE.jpg}} &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Exhibitors:''' &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
{{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Cooperators:'''  &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://aiscanner.sinaapp.com/site/|logo=Aiscanner.png}} {{MemberLinks|link=http://www.broadview.com.cn/|logo=Broadview.jpg}} &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}  &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}{{MemberLinks|link=http://www.zdnet.com.cn/|logo=Zdnet.gif‎}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=Xinxianquanyujishu.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119537</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119537"/>
				<updated>2011-10-25T12:59:37Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* November 9th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony: Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Liping Ding'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; Silver lining in dark clouds: A look at cloud computing security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Hanqing Wu'''&amp;lt;br&amp;gt; Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | ''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:10 – 15:40 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Yuming Xia'''&amp;lt;br&amp;gt; Web2.0 Secure Coding Practice&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 – 16:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 – 16:40 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Huawei Symantec'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:40 – 17:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011：Lesson for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:10 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt;Beefing up Cloud Application through Genetic Network Coding &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Dr. Meng-Chow Kang'''&amp;lt;br&amp;gt; Overview of ISO/IEC 27034 - the Application Security Standards&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Chenming Zhong&amp;lt;br&amp;gt;Overview of Website Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 16:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:15 – 16:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:45 – 17:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:15 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;Future Plan of OWASP China. Release of WAF Testing Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}} {{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}  &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119477</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119477"/>
				<updated>2011-10-22T09:40:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* November 9th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony: Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Liping Ding'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; Silver lining in dark clouds: A look at cloud computing security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Hanqing Wu'''&amp;lt;br&amp;gt; Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | ''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:10 – 15:40 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Yuming Xia'''&amp;lt;br&amp;gt; Web2.0 Secure Coding Practice&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 – 16:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 – 16:40 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Huawei Symantec'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:40 – 17:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011：Lesson for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:10 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt;Beefing up Cloud Application through Genetic Network Coding &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''ISC2'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Chenming Zhong&amp;lt;br&amp;gt;Overview of Website Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 16:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:15 – 16:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:45 – 17:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:15 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;Future Plan of OWASP China. Release of WAF Testing Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}} {{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}  &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119476</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119476"/>
				<updated>2011-10-22T09:38:35Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* November 8th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony: Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Liping Ding'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; Silver lining in dark clouds: A look at cloud computing security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Hanqing Wu'''&amp;lt;br&amp;gt; Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | ''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:10 – 15:40 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Yuming Xia'''&amp;lt;br&amp;gt; Web2.0 Secure Coding Practice&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 – 16:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 – 16:40 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Huawei Symantec'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:40 – 17:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011：Lesson for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:10 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; To Enhance Cloud Application Security by Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''ISC2'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Chenming Zhong&amp;lt;br&amp;gt;Overview of Website Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 16:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:15 – 16:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:45 – 17:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:15 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;Future Plan of OWASP China. Release of WAF Testing Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}} {{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}  &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119475</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=119475"/>
				<updated>2011-10-22T09:15:39Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* Hotel */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony: Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Liping Ding'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; View of Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Hanqing Wu'''&amp;lt;br&amp;gt; Flaws of Popular Application Applied Encryption Algorithms and the Corresponding Utilization&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | ''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:10 – 15:40 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Yuming Xia'''&amp;lt;br&amp;gt; Web2.0 Secure Coding Practice&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 – 16:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 – 16:40 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Huawei Symantec'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:40 – 17:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011：Lesson for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:10 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; To Enhance Cloud Application Security by Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''ISC2'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch &amp;amp; Networking'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Chenming Zhong&amp;lt;br&amp;gt;Overview of Website Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 16:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:15 – 16:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:45 – 17:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:15 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;Future Plan of OWASP China. Release of WAF Testing Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.nsfocus.com/en/|logo=NSFOCUS.jpg}} {{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} {{MemberLinks|link=http://www.anchiva.com/|logo=Anchiva.png}}&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.legendsec.com/|logo=SECWORLD.gif‎‎}} {{MemberLinks|link=http://www.knownsec.com/en//|logo=Knownsec.gif‎}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}  &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}{{MemberLinks|link=http://www.searchsecurity.com.cn/|logo=TT-China.gif}}{{MemberLinks|link=http://www.itxinwen.com/|logo=IT55464e1a65b095fb7f51.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;{{MemberLinks|link=http://www.techweb.com.cn/|logo=TechWeblogo.jpg}}{{MemberLinks|link=http://www.ittime.com.cn/|logo=IT65f64ee35468520a-60.gif}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118840</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118840"/>
				<updated>2011-10-11T04:44:00Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* Hotel */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony, Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:10 – 10:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; View of Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:50 – 11:20 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:20 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; To Enhance Cloud Application Security by Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang, Yuming Xia'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011: Lessons for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder'''&amp;lt;br&amp;gt; OWASP Live CD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}} {{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star&lt;br /&gt;
&lt;br /&gt;
3. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing&lt;br /&gt;
( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118839</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118839"/>
				<updated>2011-10-11T04:37:28Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* Hotel */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Tobias Gondrom ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/cf/Tobias.gondrom.jpg &lt;br /&gt;
| Tobias Gondrom is Managing Director of an IT Security &amp;amp; Risk Management Advisory based in the United Kingdom and Germany. He has twelve years of experience in software development, application security, cryptography, electronic signatures and global standardisation organisations working for independent software vendors and large global corporations in the financial, technology and government sector, in America, EMEA and APAC. As the Global Head of the Security Team at Open Text (2005-2007) and from 2000-2004 as the lead of the Security Task Force at IXOS Software AG, he was responsible for security, risk and incident management and introduced and implemented a secure SDLC used globally by development departments in the US, Canada, UK and Germany.&lt;br /&gt;
&lt;br /&gt;
Since 2003 he is the chair of working groups of the IETF (www.ietf.org) in the security area, member of the IETF security directorate, and since 2010 chair of the formed web security WG at the IETF, and a former chapter lead of the German OWASP chapter from 2007 to 2008 and board member of OWASP London. Tobias is the author of the international standards RFC 4998, RFC 6283 and co-author and contributor to a number of internet standards and papers on security and electronic signatures, as well as the co-author of the book „Secure Electronic Archiving“, and frequent presenter at conferences and publication of articles (e.g. AppSec, ISSE, Moderner Staat, IETF, VOI-booklet “Electronic Signature“, iX).&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c4/Jw-headshot-200px.jpg &lt;br /&gt;
| Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony, Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:10 – 10:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; View of Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:50 – 11:20 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:20 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; To Enhance Cloud Application Security by Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang, Yuming Xia'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011: Lessons for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder'''&amp;lt;br&amp;gt; OWASP Live CD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}} {{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for advanced Rooms: RMB 620/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star&lt;br /&gt;
&lt;br /&gt;
3. Aoyou Hotel&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing( 10 minutes walk to conference center)&lt;br /&gt;
 single room: RMB 240(including Breakfast),  &lt;br /&gt;
 Double room: RMB 320(including breakfast).&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118124</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118124"/>
				<updated>2011-09-28T08:39:42Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
&lt;br /&gt;
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony, Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:10 – 10:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; View of Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:50 – 11:20 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:20 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; To Enhance Cloud Application Security by Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang, Yuming Xia'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011: Lessons for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder'''&amp;lt;br&amp;gt; OWASP Live CD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}} {{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star &lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118123</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118123"/>
				<updated>2011-09-28T08:36:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony, Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:10 – 10:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; View of Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:50 – 11:20 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:20 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; To Enhance Cloud Application Security by Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang, Yuming Xia'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011: Lessons for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder'''&amp;lt;br&amp;gt; OWASP Live CD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;/fck:hr&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;/fck:hr&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}} {{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;/fck:hr&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star &lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CSDN.jpg&amp;diff=118122</id>
		<title>File:CSDN.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CSDN.jpg&amp;diff=118122"/>
				<updated>2011-09-28T08:33:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: uploaded a new version of &amp;amp;quot;File:CSDN.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CSDN.jpg&amp;diff=118121</id>
		<title>File:CSDN.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CSDN.jpg&amp;diff=118121"/>
				<updated>2011-09-28T08:28:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: uploaded a new version of &amp;amp;quot;File:CSDN.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CSDN_40.gif&amp;diff=118119</id>
		<title>File:CSDN 40.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CSDN_40.gif&amp;diff=118119"/>
				<updated>2011-09-28T08:10:34Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: uploaded a new version of &amp;amp;quot;File:CSDN 40.gif&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CSDN_40.gif&amp;diff=118118</id>
		<title>File:CSDN 40.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CSDN_40.gif&amp;diff=118118"/>
				<updated>2011-09-28T08:08:03Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118117</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=118117"/>
				<updated>2011-09-28T07:51:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;background-color: transparent;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
OWASP Website: http://www.owasp.org&lt;br /&gt;
Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony, Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:10 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:10 – 10:50 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; View of Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:50 – 11:20 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:20 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; To Enhance Cloud Application Security by Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wenju Wang, Yuming Xia'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011: Lessons for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Sebastien Deleersnyder'''&amp;lt;br&amp;gt; OWASP Live CD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#d98b66&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | TBD&amp;lt;br&amp;gt;TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 17:45 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | Exhibition of Internet Security Products&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; | '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 10th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Tobias Gondrom''' &amp;lt;br&amp;gt; OWASP for CISO and senior managers&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Wei Zhang'''&amp;lt;br&amp;gt; Secured Framework Design for Online Banking System&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''November 11th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 12:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#8595c2&amp;quot; | '''Wenjun Wang''' &amp;lt;br&amp;gt; OWASP Top 10 and Countermeasures&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 18:00 &lt;br /&gt;
| align=&amp;quot;CENTER&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure Way of Development - Resolving and Preventing Security Vulnerabilities from Origin&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}} {{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}} {{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}} {{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}} {{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}} &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; {{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}} {{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}} &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;/fck:hr&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}} {{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}} {{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}} {{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}} &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;/fck:hr&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Chinese Media:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;iflanguage is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/iflanguage&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; background-color: rgb(255, 255, 255);&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align: center; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}} {{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}} {{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}} {{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}} {{MemberLinks|link=http://www.ciotimes.com//|logo=CIOlogo.jpg}}{{MemberLinks|link=http://www.csdn.net//|logo=CSDN.jpg}}&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;fck:hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;/fck:hr&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star &lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&amp;lt;/fck:hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CSDN.jpg&amp;diff=118116</id>
		<title>File:CSDN.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CSDN.jpg&amp;diff=118116"/>
				<updated>2011-09-28T07:46:24Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CIOlogo.jpg&amp;diff=118115</id>
		<title>File:CIOlogo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CIOlogo.jpg&amp;diff=118115"/>
				<updated>2011-09-28T07:45:14Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117742</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117742"/>
				<updated>2011-09-21T09:39:31Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg &lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD. &lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001). Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Guest Speakers  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png &lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Marco M. Morana  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Daniel Ching Wa Ng  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/39/Daniel_ng.jpg &lt;br /&gt;
| NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jonathan Werrett  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Noa Bar Yosef  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
 OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
 OWASP Website: http://www.owasp.org&lt;br /&gt;
 Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
 Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 8th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:15 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Rip, OWASP China'''&amp;lt;br&amp;gt; Opening Ceremony, Development of OWASP China&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:15 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Sebastien Deleersnyder, OWASP Global Committee'''&amp;lt;br&amp;gt; Opening Ceremony&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 09:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:50 – 10:10 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Government Leader'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:10 – 10:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Manoranjan Paul'''&amp;lt;br&amp;gt; View of Cloud Computing Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:50 – 11:20 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Frank Fan'''&amp;lt;br&amp;gt; Current Web Security and its' Future&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:20 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Cassio Goldschmidt'''&amp;lt;br&amp;gt; The Fundamental Approaches and Tools to Achieve Secured Development Life Cycle&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Jonathan Werrett'''&amp;lt;br&amp;gt; WAFs: Patch First, Ask Questions Later&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Daniel Ng'''&amp;lt;br&amp;gt; To Enhance Cloud Application Security by Genetic Network Coding&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Larry Man'''&amp;lt;br&amp;gt; Data Control: Improve Database Security through Vulnerability Management&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 16:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Langyu Hu'''&amp;lt;br&amp;gt; RFID Security&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | &amp;lt;br&amp;gt; Exhibition of Internet Security Products&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== '''November 9th'''  ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:00 – 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Registration'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 – 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Wenju Wang, Yuming Xia'''&amp;lt;br&amp;gt; The XSS Detection and Defense Techniques and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 – 10:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Marco M. Morana'''&amp;lt;br&amp;gt; The Financial Industry Web Application Single Sign-On (SSO) Framework Design and Case Studies&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:00 – 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Jianmeng Li'''&amp;lt;br&amp;gt; Secure C Function: The Lightweight Solution for Buffer Overflow&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 – 11:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Noa Bar Yosef'''&amp;lt;br&amp;gt; Hacking 2011: Lessons for 2012&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:00 – 11:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Sponsor'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 11:30 – 12:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Sebastien Deleersnyder'''&amp;lt;br&amp;gt; OWASP Live CD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:00 – 13:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Lunch'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 13:30 – 14:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 – 14:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Tony'''&amp;lt;br&amp;gt; 2011 Application Security with 0-Day Vulnerability Analysis&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 14:30 – 15:00 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 15:00 – 15:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 15:30 – 17:45 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | &amp;lt;br&amp;gt; Exhibition of Internet Security Products&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 17:45 – 18:00 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | &amp;lt;br&amp;gt; '''Closing'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&amp;lt;IfLanguage Is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
{|style=&amp;quot;width:100%;background-color:#fff;border:1px solid #ccc&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:center;color:#000&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://english.venustech.com.cn|logo=Venustech.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.dumasoftware.com/about.asp?ArticleID=190|logo=Dumalogo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.szboweb.com/?site_language=english|logo=SZB Blogo 40.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.dbappsecurity.com.cn|logo=Dbappsecurity.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.ankki.com/|logo=Ankki.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{MemberLinks|link=https://www.trustwave.com/|logo=Trustwave-Logo-with-Tagline.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.mainway.net/|logo=Mainway.jpg}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Media Partners  ====&lt;br /&gt;
&lt;br /&gt;
'''International Media:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&amp;lt;IfLanguage Is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
{|style=&amp;quot;width:100%;background-color:#fff;border:1px solid #ccc&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:center;color:#000&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.isc2.org/|logo=Isc2 logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://fanaticmedia.com/infosecurity/|logo=InfoSecurity logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.fanaticmedia.com/|logo=Fanatic Media Logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://chmag.in/|logo=Chmag.in.png}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Chinese Media:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&amp;lt;IfLanguage Is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
{|style=&amp;quot;width:100%;background-color:#fff;border:1px solid #ccc&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:center;color:#000&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.51cto.com//|logo=51CTO.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.it168.com/|logo=IT168.JPG}}&lt;br /&gt;
{{MemberLinks|link=http://www.hackerxfiles.net/forum.php/|logo=Hackfiles.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.chinabyte.com//|logo=Byte.jpg}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
The registration is fee for OWASP members. To become a member, just click [https://www.owasp.org/index.php/Membership here]. If you are located in the Asia Pacific region, then you may qualify for a reduced membership fee. Please contact your [https://www.owasp.org/index.php/Category:OWASP_Chapter local chapters] for details. &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star &lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CWW.jpg&amp;diff=117664</id>
		<title>File:CWW.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CWW.jpg&amp;diff=117664"/>
				<updated>2011-09-20T07:29:20Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Isc2_logo.jpg&amp;diff=117663</id>
		<title>File:Isc2 logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Isc2_logo.jpg&amp;diff=117663"/>
				<updated>2011-09-20T07:25:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ccidnet.jpg&amp;diff=117662</id>
		<title>File:Ccidnet.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ccidnet.jpg&amp;diff=117662"/>
				<updated>2011-09-20T07:23:39Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Byte.jpg&amp;diff=117661</id>
		<title>File:Byte.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Byte.jpg&amp;diff=117661"/>
				<updated>2011-09-20T07:19:47Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:51CTO.jpg&amp;diff=117660</id>
		<title>File:51CTO.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:51CTO.jpg&amp;diff=117660"/>
				<updated>2011-09-20T07:17:57Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mainway.jpg&amp;diff=117659</id>
		<title>File:Mainway.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mainway.jpg&amp;diff=117659"/>
				<updated>2011-09-20T07:14:23Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SZB_Blogo_40.jpg&amp;diff=117658</id>
		<title>File:SZB Blogo 40.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SZB_Blogo_40.jpg&amp;diff=117658"/>
				<updated>2011-09-20T07:11:38Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117383</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117383"/>
				<updated>2011-09-15T05:23:03Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png&lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
=== Marco M. Morana===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati&lt;br /&gt;
chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
=== Daniel Ching Wa Ng===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg&lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD.&lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001).&lt;br /&gt;
Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. &lt;br /&gt;
Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
=== Jonathan Werrett===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
=== Noa Bar Yosef===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development.  &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Yuming Xia(Bruce), employee of Cisco System Inc., focusing on application security, including penetration testing and security solution development.Before joining Cisco, Bruce was a network analyzer for China Telecom. And as a main author for book “Software Quality Management” (Tsinghua University Press, 2007), he has lots of experience in quality assurance and security processes. After one year of technical study in San Jose (CA, USA) , he is fully skilled on security issue detection and solution development, and now acting as security owner for several large projects.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
 OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
 OWASP Website: http://www.owasp.org&lt;br /&gt;
 Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
 Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&lt;br /&gt;
=== Preliminary Program  ===&lt;br /&gt;
&lt;br /&gt;
*Tue, November 8, 2011 - Conference. Exhibition(TBD).&lt;br /&gt;
&lt;br /&gt;
*Wed, November 9, 2011 - Conference. Exhibition(TBD)&lt;br /&gt;
&lt;br /&gt;
*Thu, November 10, 2011 - Training&lt;br /&gt;
&lt;br /&gt;
*Fri, November 11, 2011 - Training .&lt;br /&gt;
&lt;br /&gt;
=== Final Program  ===&lt;br /&gt;
&lt;br /&gt;
The final program will be available before October 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
*[http://english.venustech.com.cn Venustech] &lt;br /&gt;
*[http://www.dumasoftware.com/about.asp?ArticleID=190 Duma Software Consulting Technology] &lt;br /&gt;
*[http://www.szboweb.com/?site_language=english SZBOWEB Company Limited] &lt;br /&gt;
*[http://www.dbappsecurity.com.cn DBAPPSecurity]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Partners ====&lt;br /&gt;
&lt;br /&gt;
=== Media Partners  ===&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
It it free for all OWASP members and all OWASP China chapter members. &lt;br /&gt;
&lt;br /&gt;
If you are neither an OWASP member nor an OWASP China chapter member, please feel free to join us! &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star &lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117381</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117381"/>
				<updated>2011-09-15T04:14:48Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png&lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
=== Marco M. Morana===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati&lt;br /&gt;
chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
=== Daniel Ching Wa Ng===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg&lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD.&lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001).&lt;br /&gt;
Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. &lt;br /&gt;
Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
=== Jonathan Werrett===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
=== Noa Bar Yosef===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development.  &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Yuming Xia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
 OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
 OWASP Website: http://www.owasp.org&lt;br /&gt;
 Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
 Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&lt;br /&gt;
=== Preliminary Program  ===&lt;br /&gt;
&lt;br /&gt;
*Tue, November 8, 2011 - Conference. Exhibition(TBD).&lt;br /&gt;
&lt;br /&gt;
*Wed, November 9, 2011 - Conference. Exhibition(TBD)&lt;br /&gt;
&lt;br /&gt;
*Thu, November 10, 2011 - Training&lt;br /&gt;
&lt;br /&gt;
*Fri, November 11, 2011 - Training .&lt;br /&gt;
&lt;br /&gt;
=== Final Program  ===&lt;br /&gt;
&lt;br /&gt;
The final program will be available before October 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
*[http://english.venustech.com.cn Venustech] &lt;br /&gt;
*[http://www.dumasoftware.com/about.asp?ArticleID=190 Duma Software Consulting Technology] &lt;br /&gt;
*[http://www.szboweb.com/?site_language=english SZBOWEB Company Limited] &lt;br /&gt;
*[http://www.dbappsecurity.com.cn DBAPPSecurity]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Partners ====&lt;br /&gt;
&lt;br /&gt;
=== Media Partners  ===&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
It it free for all OWASP members and all OWASP China chapter members. &lt;br /&gt;
&lt;br /&gt;
If you are neither an OWASP member nor an OWASP China chapter member, please feel free to join us! &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star &lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ankki.gif&amp;diff=117380</id>
		<title>File:Ankki.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ankki.gif&amp;diff=117380"/>
				<updated>2011-09-15T04:06:17Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Dbappsecurity.jpg&amp;diff=117379</id>
		<title>File:Dbappsecurity.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Dbappsecurity.jpg&amp;diff=117379"/>
				<updated>2011-09-15T04:04:24Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Venustech.gif&amp;diff=117378</id>
		<title>File:Venustech.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Venustech.gif&amp;diff=117378"/>
				<updated>2011-09-15T04:03:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Dumalogo.jpg&amp;diff=117377</id>
		<title>File:Dumalogo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Dumalogo.jpg&amp;diff=117377"/>
				<updated>2011-09-15T03:54:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117376</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117376"/>
				<updated>2011-09-15T03:50:11Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: /* Sponsor US! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png&lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
=== Marco M. Morana===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati&lt;br /&gt;
chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
=== Daniel Ching Wa Ng===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg&lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD.&lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001).&lt;br /&gt;
Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. &lt;br /&gt;
Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
=== Jonathan Werrett===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
=== Noa Bar Yosef===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development.  &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Yuming Xia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
 OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
 OWASP Website: http://www.owasp.org&lt;br /&gt;
 Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
 Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&lt;br /&gt;
=== Preliminary Program  ===&lt;br /&gt;
&lt;br /&gt;
*Tue, November 8, 2011 - Conference. Exhibition(TBD).&lt;br /&gt;
&lt;br /&gt;
*Wed, November 9, 2011 - Conference. Exhibition(TBD)&lt;br /&gt;
&lt;br /&gt;
*Thu, November 10, 2011 - Training&lt;br /&gt;
&lt;br /&gt;
*Fri, November 11, 2011 - Training .&lt;br /&gt;
&lt;br /&gt;
=== Final Program  ===&lt;br /&gt;
&lt;br /&gt;
The final program will be available before October 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
*[http://english.venustech.com.cn Venustech] &lt;br /&gt;
*[http://www.dumasoftware.com/about.asp?ArticleID=190 Duma Software Consulting Technology] &lt;br /&gt;
*[http://www.szboweb.com/?site_language=english SZBOWEB Company Limited] &lt;br /&gt;
*[http://www.dbappsecurity.com.cn DBAPPSecurity]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Partners ====&lt;br /&gt;
&lt;br /&gt;
=== Media Partners  ===&lt;br /&gt;
&lt;br /&gt;
=== Personal Partners  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
It it free for all OWASP members and all OWASP China chapter members. &lt;br /&gt;
&lt;br /&gt;
If you are neither an OWASP member nor an OWASP China chapter member, please feel free to join us! &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star &lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117375</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117375"/>
				<updated>2011-09-15T03:33:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png&lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
=== Marco M. Morana===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati&lt;br /&gt;
chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
=== Daniel Ching Wa Ng===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg&lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD.&lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001).&lt;br /&gt;
Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. &lt;br /&gt;
Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
=== Jonathan Werrett===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
=== Noa Bar Yosef===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
=== Jianmeng Li===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Jianmeng Li（Jimmy）is a core member of security team in CISCO CSG. When graduated at 2011, Jimmy worked on the development of client and website for a foreign company. In 2004, he was dispatched to Japan for a year. Jimmy joined Huawei technologies Co., LTD when he came back and worked to develop mobile communication platform. Then Jimmy joined CISCO at 2006 and worked on the development of backend server of online products and application security field. He has rich developing experience on multi-language and multi-platform and is responsible for the training of C/C++ convention and skills. Currently Jimmy is focusing on Fuzz test and secure development.  &lt;br /&gt;
&lt;br /&gt;
=== Yuming Xia===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Yuming Xia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
 OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
 OWASP Website: http://www.owasp.org&lt;br /&gt;
 Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
 Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&lt;br /&gt;
=== Preliminary Program  ===&lt;br /&gt;
&lt;br /&gt;
*Tue, November 8, 2011 - Conference. Exhibition(TBD).&lt;br /&gt;
&lt;br /&gt;
*Wed, November 9, 2011 - Conference. Exhibition(TBD)&lt;br /&gt;
&lt;br /&gt;
*Thu, November 10, 2011 - Training&lt;br /&gt;
&lt;br /&gt;
*Fri, November 11, 2011 - Training .&lt;br /&gt;
&lt;br /&gt;
=== Final Program  ===&lt;br /&gt;
&lt;br /&gt;
The final program will be available before October 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Intented Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
*[http://english.venustech.com.cn Venustech] &lt;br /&gt;
*[http://www.dumasoftware.com/about.asp?ArticleID=190 Duma Software Consulting Technology] &lt;br /&gt;
*[http://www.szboweb.com/?site_language=english SZBOWEB Company Limited] &lt;br /&gt;
*[http://www.dbappsecurity.com.cn DBAPPSecurity]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Partners ====&lt;br /&gt;
=== Media Partners  ===&lt;br /&gt;
&lt;br /&gt;
=== Personal Partners  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
It it free for all OWASP members and all OWASP China chapter members. &lt;br /&gt;
&lt;br /&gt;
If you are neither an OWASP member nor an OWASP China chapter member, please feel free to join us! &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star &lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Zdnet.jpg&amp;diff=116944</id>
		<title>File:Zdnet.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Zdnet.jpg&amp;diff=116944"/>
				<updated>2011-09-08T10:34:44Z</updated>
		
		<summary type="html">&lt;p&gt;Rip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rip</name></author>	</entry>

	</feed>