<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rsl81</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rsl81"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rsl81"/>
		<updated>2026-04-26T00:17:47Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Regular_expression_Denial_of_Service_-_ReDoS&amp;diff=200401</id>
		<title>Regular expression Denial of Service - ReDoS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Regular_expression_Denial_of_Service_-_ReDoS&amp;diff=200401"/>
				<updated>2015-09-11T07:33:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{template: Attack}}&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The '''Regular expression Denial of Service (ReDoS)''' is a [[Denial of Service]] attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
===The problematic Regex naïve algorithm===&lt;br /&gt;
The Regular Expression naïve algorithm builds a [http://en.wikipedia.org/wiki/Nondeterministic_finite_state_machine Nondeterministic Finite Automaton (NFA)], which is a finite state machine where for each pair of state and input symbol there may be several possible next states. Then the engine starts to make transition until the end of the input. Since there may be several possible next states, a deterministic algorithm is used. This algorithm tries one by one all the possible paths (if needed) until a match is found (or all the paths are tried and fail).&lt;br /&gt;
&lt;br /&gt;
For example, the Regex '''''^(a+)+$''''' is represented by the following NFA:&lt;br /&gt;
&lt;br /&gt;
:::[[File:NFA.png]]&lt;br /&gt;
&lt;br /&gt;
For the input '''''aaaaX''''' there are 16 possible paths in the above graph. But for '''''aaaaaaaaaaaaaaaaX''''' there are 65536 possible paths, and the number is double for each additional '''''a'''''. This is an extreme case where the naïve algorithm is problematic, because it must pass on many many paths, and then fail.&lt;br /&gt;
&lt;br /&gt;
Notice, that not all algorithms are naïve, and actually Regex algorithms can be written in an efficient way. Unfortunately, most Regex engines today try to solve not only &amp;quot;pure&amp;quot; Regexes, but also &amp;quot;expanded&amp;quot; Regexes with &amp;quot;special additions&amp;quot;, such as back-references that cannot be always be solved efficiently (see '''Patterns for non-regular languages''' in [http://en.wikipedia.org/wiki/Regular_expression Wiki-Regex] for some more details). So even if the Regex is not &amp;quot;expanded&amp;quot;, a naïve algorithm is used.&lt;br /&gt;
&lt;br /&gt;
===Evil Regexes===&lt;br /&gt;
A Regex is called &amp;quot;evil&amp;quot; if it can stuck on crafted input.&lt;br /&gt;
&lt;br /&gt;
'''Evil Regex pattern contains''':&lt;br /&gt;
* Grouping with repetition&lt;br /&gt;
* Inside the repeated group:&lt;br /&gt;
** Repetition&lt;br /&gt;
** Alternation with overlapping&lt;br /&gt;
&lt;br /&gt;
'''Examples of Evil Patterns''':&lt;br /&gt;
* (a+)+&lt;br /&gt;
* ([a-zA-Z]+)*&lt;br /&gt;
* (a|aa)+&lt;br /&gt;
* (a|a?)+&lt;br /&gt;
* (.*a){x} | for x &amp;gt; 10&lt;br /&gt;
&lt;br /&gt;
All the above are susceptible to the input '''''aaaaaaaaaaaaaaaaaaaaaaaa!''''' (The minimum input length might change slightly, when using faster or slower machines).&lt;br /&gt;
&lt;br /&gt;
===Attacks===&lt;br /&gt;
The attacker might use the above knowledge to look for applications that use Regular Expressions, containing an '''Evil Regex''', and send a well-crafted input, that will hang the system. Alternatively, if a Regex itself is affected by a user input, the attacker can inject an '''Evil Regex''', and make the system vulnerable.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
The Web is Regex-Based:&lt;br /&gt;
&lt;br /&gt;
:::[[File:RegexBasedWeb.png]]&lt;br /&gt;
&lt;br /&gt;
In every layer of the WEB there are Regular Expressions, that might contain an '''Evil Regex'''. An attacker can hang a WEB-browser (on a computer or potentially also on a mobile device), hang a Web Application Firewall (WAF), attack a database, and even stack a vulnerable WEB server.&lt;br /&gt;
&lt;br /&gt;
For example, if a programmer uses a Regex to validate the client side of a system, and the Regex contains an '''Evil Regex''', the attacker can assume the same vulnerable Regex is used in the server side, and send a well-crafted input, that stacks the WEB server.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
===Vulnerable Regex in online repositories===&lt;br /&gt;
1. [http://regexlib.com/REDetails.aspx?regexp_id=1757 ReGexLib,id=1757 (email validation)] - see bold part, which is an '''Evil Regex'''&lt;br /&gt;
 ^([a-zA-Z0-9])'''(([\-.]|[_]+)?([a-zA-Z0-9]+))*'''(@){1}[a-z0-9]+[.]{1}(([a-z]{2,3})|([a-z]{2,3}[.]{1}[a-z]{2,3}))$&lt;br /&gt;
 &lt;br /&gt;
Input:&lt;br /&gt;
 aaaaaaaaaaaaaaaaaaaaaaaa!&lt;br /&gt;
&lt;br /&gt;
2. [[OWASP Validation Regex Repository]], Java Classname - see bold part, which is an '''Evil Regex'''&lt;br /&gt;
 ^'''(([a-z])+.)+'''[A-Z]([a-z])+$&lt;br /&gt;
 &lt;br /&gt;
Input:&lt;br /&gt;
 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!&lt;br /&gt;
&lt;br /&gt;
===Web application attack===&lt;br /&gt;
* Open a JavaScript &lt;br /&gt;
* Find '''Evil Regex'''&lt;br /&gt;
* Craft a malicious input for the found Regex&lt;br /&gt;
* Submit a valid value via intercepting proxy &lt;br /&gt;
* Change the request to contain a malicious input&lt;br /&gt;
* You are done!&lt;br /&gt;
&lt;br /&gt;
===ReDoS via Regex Injection===&lt;br /&gt;
The following example checks if the username is part of the password entered by the user.&lt;br /&gt;
 String userName = textBox1.Text;&lt;br /&gt;
 String password = textBox2.Text;&lt;br /&gt;
 Regex testPassword = new Regex(userName);&lt;br /&gt;
 Match match = testPassword.Match(password);&lt;br /&gt;
 if (match.Success)&lt;br /&gt;
 {&lt;br /&gt;
     MessageBox.Show(&amp;quot;Do not include name in password.&amp;quot;);&lt;br /&gt;
 }&lt;br /&gt;
 else&lt;br /&gt;
 {&lt;br /&gt;
     MessageBox.Show(&amp;quot;Good password.&amp;quot;);&lt;br /&gt;
 }&lt;br /&gt;
If an attacker enters ''^(([a-z])+.)+[A-Z]([a-z])+$'' as a username and ''aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!'' as a password, the program will hang.&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[:Category: Input Validation Vulnerability]]&lt;br /&gt;
* [[:Category: API Abuse]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[Input Validation]]&lt;br /&gt;
* [[Output Validation]]&lt;br /&gt;
* [[Canonicalization]]&lt;br /&gt;
&lt;br /&gt;
==References ==&lt;br /&gt;
* [http://www.cs.rice.edu/~scrosby/hash/slides/USENIX-RegexpWIP.2.ppt Regular Expression Denial Of Service / Crosby&amp;amp;Wallach, Usenix Security 2003]&lt;br /&gt;
* [http://www.checkmarx.com/NewsDetails.aspx?id=23&amp;amp;cat=3 Regular expression Denial of Service Revisited, Sep-2009]&lt;br /&gt;
* [[Media:20091210_VAC-REGEX_DOS-Adar_Weidman.pdf| VAC Presentation - ReDoS, OWASP-NL Chapter meeting Dec-2009]]&lt;br /&gt;
* [[Podcast 56|OWASP podcast about ReDoS]]&lt;br /&gt;
* [[OWASP Validation Regex Repository]]&lt;br /&gt;
* [http://regexlib.com/ RegExLib]&lt;br /&gt;
* Examples of ReDoS in open source applications:&lt;br /&gt;
** [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3277 ReDoS in DataVault]&lt;br /&gt;
** [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3275 ReDoS in EntLib]&lt;br /&gt;
** [http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3276 ReDoS in NASD CORE.NET Terelik]&lt;br /&gt;
** [http://blog.malerisch.net/2015/09/net-mvc-redos-denial-of-service-vulnerability-cve-2015-2526.html ReDoS in .NET Framework]&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
{{Template:Checkmarx}}&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
[[Category:Injection]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106156</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106156"/>
				<updated>2011-03-02T22:23:01Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* OWASP NZ Members */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=New_Zealand|extra=The chapter leaders are [mailto:nick.freeman@owasp.org Nick Freeman] and [mailto:scott.bell@owasp.org Scott Bell] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newzealand|emailarchives=http://lists.owasp.org/pipermail/owasp-newzealand}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' [http://www.owasp.org/images/5/5e/2011-03-02-OWASP.pdf I know what you did last summer: The latest from the world of web hacks]&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Nick Freeman and Scott Bell have been appointed as the new leaders of the new OWASP New Zealand Chapter&lt;br /&gt;
* Roberto Suggi Liverani has resigned from his position as OWASP New Zealand Chapter Leader&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Auckland)&amp;lt;/b&amp;gt; [mailto:nick.freeman(at)owasp.org Nick Freeman] 021 424 777&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Memeber (Leader - Wellington)&amp;lt;/b&amp;gt; [mailto:scott.bell(at)owasp.org Scott Bell]  021 776 410&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106150</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106150"/>
				<updated>2011-03-02T21:39:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* OWASP NZ Members */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=New_Zealand|extra=The chapter leaders are [mailto:nick.freeman@owasp.org Nick Freeman] and [mailto:scott.bell@owasp.org Scott Bell] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newzealand|emailarchives=http://lists.owasp.org/pipermail/owasp-newzealand}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' [http://www.owasp.org/images/5/5e/2011-03-02-OWASP.pdf I know what you did last summer: The latest from the world of web hacks]&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Nick Freeman and Scott Bell have been appointed as the new leaders of the new OWASP New Zealand Chapter&lt;br /&gt;
* Roberto Suggi Liverani has resigned from his position as OWASP New Zealand Chapter Leader&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Auckland)&amp;lt;/b&amp;gt; [mailto:nick.freeman(at)owasp.org Nick Freeman] 021 424 777&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Memeber (Leader - Wellington)&amp;lt;/b&amp;gt; [mailto:scott.bell(at)owasp.org Scott Bell] 021 045 6672&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106147</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106147"/>
				<updated>2011-03-02T21:35:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=New_Zealand|extra=The chapter leaders are [mailto:nick.freeman@owasp.org Nick Freeman] and [mailto:scott.bell@owasp.org Scott Bell] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-newzealand|emailarchives=http://lists.owasp.org/pipermail/owasp-newzealand}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' [http://www.owasp.org/images/5/5e/2011-03-02-OWASP.pdf I know what you did last summer: The latest from the world of web hacks]&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Nick Freeman and Scott Bell have been appointed as the new leaders of the new OWASP New Zealand Chapter&lt;br /&gt;
* Roberto Suggi Liverani has resigned from his position as OWASP New Zealand Chapter Leader&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Auckland)&amp;lt;/b&amp;gt; [mailto:nick.freeman(at)security-assessment.com Nick Freeman] 021 424 777&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Memeber (Leader - Wellington)&amp;lt;/b&amp;gt; [mailto:scott.bell(at)security-assessment.com Scott Bell] 021 045 6672&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106143</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106143"/>
				<updated>2011-03-02T21:19:57Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* 2011 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' [http://www.owasp.org/images/5/5e/2011-03-02-OWASP.pdf I know what you did last summer: The latest from the world of web hacks]&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Nick Freeman and Scott Bell have been appointed as the new leaders of the new OWASP New Zealand Chapter&lt;br /&gt;
* Roberto Suggi Liverani has resigned from his position as OWASP New Zealand Chapter Leader&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Auckland)&amp;lt;/b&amp;gt; [mailto:nick.freeman(at)security-assessment.com Nick Freeman] 021 424 777&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Memeber (Leader - Wellington)&amp;lt;/b&amp;gt; [mailto:scott.bell(at)security-assessment.com Scott Bell] 021 045 6672&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:2011-03-02-OWASP.pdf&amp;diff=106142</id>
		<title>File:2011-03-02-OWASP.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:2011-03-02-OWASP.pdf&amp;diff=106142"/>
				<updated>2011-03-02T21:18:07Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Rsl81&amp;diff=106141</id>
		<title>User:Rsl81</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Rsl81&amp;diff=106141"/>
				<updated>2011-03-02T21:16:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hi, my name is Roberto Suggi Liverani. I am the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand] Founder. I work as Principal Security Consultant for Security-Assessment.com. &lt;br /&gt;
&lt;br /&gt;
Feel free to contact me at robertosl &amp;lt;at&amp;gt; owasp &amp;lt;dot&amp;gt; org . Personal Site: [http://malerisch.net http://malerisch.net]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106140</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106140"/>
				<updated>2011-03-02T21:13:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Activities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' I know what you did last summer: The latest from the world of web hacks&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Nick Freeman and Scott Bell have been appointed as the new leaders of the new OWASP New Zealand Chapter&lt;br /&gt;
* Roberto Suggi Liverani has resigned from his position as OWASP New Zealand Chapter Leader&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Auckland)&amp;lt;/b&amp;gt; [mailto:nick.freeman(at)security-assessment.com Nick Freeman] 021 424 777&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Memeber (Leader - Wellington)&amp;lt;/b&amp;gt; [mailto:scott.bell(at)security-assessment.com Scott Bell] 021 045 6672&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106139</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106139"/>
				<updated>2011-03-02T21:12:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Activities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' I know what you did last summer: The latest from the world of web hacks&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Nick Freeman and Scott Bell have been appointed as the new leaders of the new OWASP New Zealand Chapter Leaders&lt;br /&gt;
* Roberto Suggi Liverani has resigned from his position as OWASP New Zealand Chapter Leader&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Auckland)&amp;lt;/b&amp;gt; [mailto:nick.freeman(at)security-assessment.com Nick Freeman] 021 424 777&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Memeber (Leader - Wellington)&amp;lt;/b&amp;gt; [mailto:scott.bell(at)security-assessment.com Scott Bell] 021 045 6672&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106138</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106138"/>
				<updated>2011-03-02T21:11:06Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* OWASP NZ Members */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' I know what you did last summer: The latest from the world of web hacks&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader - Auckland)&amp;lt;/b&amp;gt; [mailto:nick.freeman(at)security-assessment.com Nick Freeman] 021 424 777&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Memeber (Leader - Wellington)&amp;lt;/b&amp;gt; [mailto:scott.bell(at)security-assessment.com Scott Bell] 021 045 6672&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106137</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106137"/>
				<updated>2011-03-02T21:07:35Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Upcoming Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' I know what you did last summer: The latest from the world of web hacks&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106136</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106136"/>
				<updated>2011-03-02T21:06:21Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About.&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' I know what you did last summer: The latest from the world of web hacks&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
: '''Meeting Locations:''' Auckland, 12-16 Nicholls Lane, Parnell, Level 1, Building 2 - Security-Assessment.com (Datacraft Building)&lt;br /&gt;
: '''Meeting Locations:''' Wellington, Datacraft House, Level 1, 99-105 Customhouse Quay, Wellington 6011&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
== '''2011''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2011 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About..&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' I know what you did last summer: The latest from the world of web hacks&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106064</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=106064"/>
				<updated>2011-03-02T04:41:34Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* OWASP NZ Members */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About.&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' I know what you did last summer: The latest from the world of web hacks&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
: '''Meeting Locations:''' Auckland, 12-16 Nicholls Lane, Parnell, Level 1, Building 2 - Security-Assessment.com (Datacraft Building)&lt;br /&gt;
: '''Meeting Locations:''' Wellington, Datacraft House, Level 1, 99-105 Customhouse Quay, Wellington 6011&lt;br /&gt;
&lt;br /&gt;
== Past Events == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Security-Assessment.com &amp;lt;br&amp;gt;&lt;br /&gt;
Level 1 - Building 2&amp;lt;br&amp;gt;&lt;br /&gt;
12-16 Nicholls Lane, Parnell, Auckland 1010&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105566</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105566"/>
				<updated>2011-02-22T21:01:26Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Upcoming Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About.&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' I know what you did last summer: The latest from the world of web hacks&lt;br /&gt;
: '''Presented By:''' Kirk Jackson, Security Consultant (Aura Software Security)&lt;br /&gt;
: '''Meeting Locations:''' Auckland, 12-16 Nicholls Lane, Parnell, Level 1, Building 2 - Security-Assessment.com (Datacraft Building)&lt;br /&gt;
: '''Meeting Locations:''' Wellington, Datacraft House, Level 1, 99-105 Customhouse Quay, Wellington 6011&lt;br /&gt;
&lt;br /&gt;
== Past Events == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
NZ OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
17 Woodberry Drive&amp;lt;br&amp;gt;&lt;br /&gt;
Dannemora, Auckland 2016 &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105086</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105086"/>
				<updated>2011-02-14T22:32:23Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Upcoming Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About.&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Meeting Locations:''' Auckland, 12-16 Nicholls Lane, Parnell, Level 1, Building 2 - Security-Assessment.com (Datacraft Building)&lt;br /&gt;
: '''Meeting Locations:''' Wellington, Datacraft House, Level 1, 99-105 Customhouse Quay, Wellington 6011&lt;br /&gt;
&lt;br /&gt;
== Past Events == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
NZ OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
17 Woodberry Drive&amp;lt;br&amp;gt;&lt;br /&gt;
Dannemora, Auckland 2016 &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105069</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105069"/>
				<updated>2011-02-14T21:55:47Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Upcoming Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About.&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Meeting Locations:''' Auckland, 12-16 Nicholls Lane, Parnell, Level 1, Building 2 - Security-Assessment.com (Datacraft Building)&lt;br /&gt;
: '''Meeting Locations:''' Wellington, 3rd Floor Lumley House, Hunter Street&lt;br /&gt;
&lt;br /&gt;
== Past Events == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
NZ OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
17 Woodberry Drive&amp;lt;br&amp;gt;&lt;br /&gt;
Dannemora, Auckland 2016 &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105068</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105068"/>
				<updated>2011-02-14T21:50:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Upcoming Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About.&lt;br /&gt;
: '''Presented By:''' Adrian Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
== Past Events == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
NZ OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
17 Woodberry Drive&amp;lt;br&amp;gt;&lt;br /&gt;
Dannemora, Auckland 2016 &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105067</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=105067"/>
				<updated>2011-02-14T21:49:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Upcoming Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
; 2nd March 2011&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Crazy Insecure Web Apps Google Didn't Tell You About.&lt;br /&gt;
: '''Presented By:''' Adrain Hayes, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
== Past Events == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
NZ OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
17 Woodberry Drive&amp;lt;br&amp;gt;&lt;br /&gt;
Dannemora, Auckland 2016 &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Tales-of-the-crypto.pdf&amp;diff=86776</id>
		<title>File:Tales-of-the-crypto.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Tales-of-the-crypto.pdf&amp;diff=86776"/>
				<updated>2010-07-22T12:49:35Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: uploaded a new version of &amp;quot;File:Tales-of-the-crypto.pdf&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86774</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86774"/>
				<updated>2010-07-22T01:47:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event was held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt; and was a great conference day. The event gathered an audience of 160 delegates including security professionals, developers, managers and students.&amp;lt;br&amp;gt;&lt;br /&gt;
For those people who missed the event or are interested in the conference material, some of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations presentations] have been published and can be downloaded from the presentations page.&amp;lt;br&amp;gt;&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:robertosl@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
Again, big thanks to the sponsors &amp;lt;b&amp;gt;Security-Assessment.com&amp;lt;/b&amp;gt; and &amp;lt;b&amp;gt;Lateral Security&amp;lt;/b&amp;gt;, the speakers and the conference committee for their contributions and support to the organisation of the event.&lt;br /&gt;
&lt;br /&gt;
==Blog/Coverage==&lt;br /&gt;
&lt;br /&gt;
Some blog coverage from Kirk Jackson:&lt;br /&gt;
[http://pageofwords.com/blog/CategoryView,category,OWASP.aspx http://pageofwords.com/blog/CategoryView,category,OWASP.aspx]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/b/b5/2010_OWASP_NZ.pptx Don't Try This At Home]&amp;lt;/b&amp;gt; - pptx&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/c/cc/Tales-of-the-crypto.pdf Tales from the Crypt0]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/4/49/Hosting-and-web-apps.pdf Hosting and Web Apps - The Obscurity of Security]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86773</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86773"/>
				<updated>2010-07-22T01:46:29Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event was held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt; and was a great conference day. The event gathered an audience of 160 delegates including security professionals, developers, managers and students.&amp;lt;br&amp;gt;&lt;br /&gt;
For those people who missed the event or are interested in the conference material, some of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations presentations] have been published and can be downloaded from the presentations page.&amp;lt;br&amp;gt;&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:robertosl@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
Again, big thanks to the sponsors &amp;lt;b&amp;gt;Security-Assessment.com&amp;lt;/b&amp;gt; and &amp;lt;b&amp;gt;Lateral Security&amp;lt;/b&amp;gt;, the speakers and the conference committee for their contributions and support to the organisation of the event.&lt;br /&gt;
&lt;br /&gt;
==Blog/Coverage==&lt;br /&gt;
&lt;br /&gt;
Some blog coverage from Kirk Jackson:&lt;br /&gt;
[http://pageofwords.com/blog/CategoryView,category,OWASP.aspx http://pageofwords.com/blog/CategoryView,category,OWASP.aspx]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/b/b5/2010_OWASP_NZ.pptx Don't Try This At Home]&amp;lt;/b&amp;gt; - PowerPoint&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/c/cc/Tales-of-the-crypto.pdf Tales from the Crypt0]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/4/49/Hosting-and-web-apps.pdf Hosting and Web Apps - The Obscurity of Security]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:2010_OWASP_NZ.pptx&amp;diff=86772</id>
		<title>File:2010 OWASP NZ.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:2010_OWASP_NZ.pptx&amp;diff=86772"/>
				<updated>2010-07-22T01:43:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86707</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86707"/>
				<updated>2010-07-19T22:53:48Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event was held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt; and was a great conference day. The event gathered an audience of 160 delegates including security professionals, developers, managers and students.&amp;lt;br&amp;gt;&lt;br /&gt;
For those people who missed the event or are interested in the conference material, some of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations presentations] have been published and can be downloaded from the presentations page.&amp;lt;br&amp;gt;&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:robertosl@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
Again, big thanks to the sponsors &amp;lt;b&amp;gt;Security-Assessment.com&amp;lt;/b&amp;gt; and &amp;lt;b&amp;gt;Lateral Security&amp;lt;/b&amp;gt;, the speakers and the conference committee for their contributions and support to the organisation of the event.&lt;br /&gt;
&lt;br /&gt;
==Blog/Coverage==&lt;br /&gt;
&lt;br /&gt;
Some blog coverage from Kirk Jackson:&lt;br /&gt;
[http://pageofwords.com/blog/CategoryView,category,OWASP.aspx http://pageofwords.com/blog/CategoryView,category,OWASP.aspx]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/c/cc/Tales-of-the-crypto.pdf Tales from the Crypt0]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/4/49/Hosting-and-web-apps.pdf Hosting and Web Apps - The Obscurity of Security]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86706</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86706"/>
				<updated>2010-07-19T22:52:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event was held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt; and was a great conference day. The event gathered an audience of 160 delegates including security professionals, developers, managers and students.&amp;lt;br&amp;gt;&lt;br /&gt;
For those people who missed the event or are interested in the conference material, some of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations presentations] have been published and can be downloaded from the presentations page.&amp;lt;br&amp;gt;&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:robertosl@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
Again, big thanks to the sponsors Security-Assessment.com and Lateral Security, the speakers and the conference committee for their contributions and support to the organisation of the event.&lt;br /&gt;
&lt;br /&gt;
==Blog/Coverage==&lt;br /&gt;
&lt;br /&gt;
Some blog coverage from Kirk Jackson:&lt;br /&gt;
[http://pageofwords.com/blog/CategoryView,category,OWASP.aspx http://pageofwords.com/blog/CategoryView,category,OWASP.aspx]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/c/cc/Tales-of-the-crypto.pdf Tales from the Crypt0]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/4/49/Hosting-and-web-apps.pdf Hosting and Web Apps - The Obscurity of Security]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86705</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86705"/>
				<updated>2010-07-19T22:51:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event was held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt; and was a great conference day. The event gathered an audience of 160 delegates including security professionals, developers, managers and students.&amp;lt;br&amp;gt;&lt;br /&gt;
For those people who missed the event or are interested in the conference material, the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations presentations] have been published and can be downloaded from the presentations page.&amp;lt;br&amp;gt;&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:robertosl@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
Again, big thanks to the sponsors Security-Assessment.com and Lateral Security, the speakers and the conference committee for their contributions and support to the organisation of the event.&lt;br /&gt;
&lt;br /&gt;
==Blog/Coverage==&lt;br /&gt;
&lt;br /&gt;
Some blog coverage from Kirk Jackson:&lt;br /&gt;
[http://pageofwords.com/blog/CategoryView,category,OWASP.aspx http://pageofwords.com/blog/CategoryView,category,OWASP.aspx]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/c/cc/Tales-of-the-crypto.pdf Tales from the Crypt0]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/4/49/Hosting-and-web-apps.pdf Hosting and Web Apps - The Obscurity of Security]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Hosting-and-web-apps.pdf&amp;diff=86704</id>
		<title>File:Hosting-and-web-apps.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Hosting-and-web-apps.pdf&amp;diff=86704"/>
				<updated>2010-07-19T22:49:39Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=86681</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=86681"/>
				<updated>2010-07-19T04:19:52Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Past Events == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 15th July 2010&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2010|OWASP New Zealand Day 2010]]&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
NZ OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
17 Woodberry Drive&amp;lt;br&amp;gt;&lt;br /&gt;
Dannemora, Auckland 2016 &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86679</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86679"/>
				<updated>2010-07-19T03:15:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event was held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt; and was a great conference day. The event gathered an audience of 160 delegates including security professionals, developers, managers and students.&amp;lt;br&amp;gt;&lt;br /&gt;
For those people who missed the event or are interested in the conference material, the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Presentations presentations] have been published and can be downloaded from the presentations page.&amp;lt;br&amp;gt;&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:robertosl@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
Again, big thanks to the sponsors Security-Assessment.com and Lateral Security, the speakers and the conference committee for their contributions and support to the organisation of the event.&lt;br /&gt;
&lt;br /&gt;
==Blog/Coverage==&lt;br /&gt;
&lt;br /&gt;
Some blog coverage from Kirk Jackson:&lt;br /&gt;
[http://pageofwords.com/blog/CategoryView,category,OWASP.aspx http://pageofwords.com/blog/CategoryView,category,OWASP.aspx]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/c/cc/Tales-of-the-crypto.pdf Tales from the Crypt0]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Hosting and Web Apps - The Obscurity of Security&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86678</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86678"/>
				<updated>2010-07-19T03:14:30Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event was held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt; and was a great conference day. The event gathered an audience of 160 delegates including security professionals, developers, managers and students.&amp;lt;br&amp;gt;&lt;br /&gt;
For those people who missed the event or are interested in the conference material, the presentations have been published and can be downloaded from the presentations page.&amp;lt;br&amp;gt;&lt;br /&gt;
For any comments, feedback or observations, please don't hesitate to contact [mailto:robertosl@owasp.org us].&amp;lt;br&amp;gt;&lt;br /&gt;
Again, big thanks to the sponsors Security-Assessment.com and Lateral Security, the speakers and the conference committee for their contributions and support to the organisation of the event.&lt;br /&gt;
&lt;br /&gt;
==Blog/Coverage==&lt;br /&gt;
&lt;br /&gt;
Some blog coverage from Kirk Jackson:&lt;br /&gt;
[http://pageofwords.com/blog/CategoryView,category,OWASP.aspx http://pageofwords.com/blog/CategoryView,category,OWASP.aspx]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/c/cc/Tales-of-the-crypto.pdf Tales from the Crypt0]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Hosting and Web Apps - The Obscurity of Security&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86673</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86673"/>
				<updated>2010-07-19T02:38:17Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/c/cc/Tales-of-the-crypto.pdf Tales from the Crypt0]&amp;lt;/b&amp;gt; - pdf&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Hosting and Web Apps - The Obscurity of Security&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86672</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86672"/>
				<updated>2010-07-19T02:37:14Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks] - pdf&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/c/cc/Tales-of-the-crypto.pdf Tales from the Crypt0]&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Hosting and Web Apps - The Obscurity of Security&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Tales-of-the-crypto.pdf&amp;diff=86671</id>
		<title>File:Tales-of-the-crypto.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Tales-of-the-crypto.pdf&amp;diff=86671"/>
				<updated>2010-07-19T02:36:10Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86670</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86670"/>
				<updated>2010-07-19T02:34:15Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/images/0/04/Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf Defending Against Application Level DoS Attacks] - pdf&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Tales from the Crypt0&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Hosting and Web Apps - The Obscurity of Security&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf&amp;diff=86669</id>
		<title>File:Roberto Suggi Liverani OWASPNZDAY2010-Defending against application DoS.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Roberto_Suggi_Liverani_OWASPNZDAY2010-Defending_against_application_DoS.pdf&amp;diff=86669"/>
				<updated>2010-07-19T02:30:16Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: Defending against application (L7) DoS Attacks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Defending against application (L7) DoS Attacks&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86668</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86668"/>
				<updated>2010-07-19T02:26:26Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Defending Against Application Level DoS Attacks&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Tales from the Crypt0&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Hosting and Web Apps - The Obscurity of Security&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Low Scuttling Chilli Crab:NETWORK RECON 2010AD  **== &lt;br /&gt;
&lt;br /&gt;
Network reconnaissance is an art as old as hacking, but the days of dumpster diving and fingering your away around the 'net are long in our past. In the world of Google, Wolfram|Alpha and Shodan, target acquisition is king: there's a new exploit every day, who's going down after you've finished your first cup of coffee tomorrow?&lt;br /&gt;
&lt;br /&gt;
In this presentation, Metlstorm examines the practicality, implementation and effect of datamining country-scale network targeting databases. Building on the experience of spending the previous year mapping the New Zealand internet for his Kiwicon 2009 talk &amp;quot;Do Your Fruit Hang Low&amp;quot;, Metlstorm deploys the Low Hanging Kiwifruit toolchain against its newest target: Singapore.&lt;br /&gt;
&lt;br /&gt;
So, Singapore, are your networks open? How many open DSL routers are there in Singapore? Which ISP has their blade switches open for you to telnet to? Just how useful is it to full text search every SSL certificate name, 302 Redirect target and DNS entry?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Metlstorm&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metlstorm is an independent unix hacker from New Zealand, where he milks both sheep and hobbits. In the brief gaps in this bucolic schedule, he finds time to organise Kiwicon - the NZ hacker con, co-host the award-winning Risky.biz weekly infosec podcast and hold down a day job as a whitehat security consultant. In true sellout style, Metl has worked the floor at Blackhat, Defcon, Kiwicon &amp;amp; Ruxcon, achieving minor notoriety at the latter for being the only speaker ever punched out by a member of the audience at the end of his talk. Metlstorm loves bugs that are features, carrier networks and &amp;quot;enterprise&amp;quot; unix software, because we all know that &amp;quot;enterprise&amp;quot; means &amp;quot;the 80s called, they want their long environment variables back&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
- &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk&amp;lt;/i&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86667</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86667"/>
				<updated>2010-07-19T02:19:12Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Defending Against Application Level DoS Attacks&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD **&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Tales from the Crypt0&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Hosting and Web Apps - The Obscurity of Security&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;**&amp;lt;/b&amp;gt; &amp;lt;i&amp;gt;replaced Scott Bell's &amp;quot;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;quot; talk.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86666</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=86666"/>
				<updated>2010-07-19T02:10:56Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Presentations====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Defending Against Application Level DoS Attacks&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Paul Craig – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Low Scuttling Chilli Crab:Network Recon 2010AD&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Metlstorm&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Tales from the Crypt0&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Hosting and Web Apps - The Obscurity of Security&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=86452</id>
		<title>New Zealand</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_Zealand&amp;diff=86452"/>
				<updated>2010-07-14T10:00:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome to the OWASP New Zealand Local Chapter  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP New Zealand chapter site. &lt;br /&gt;
&lt;br /&gt;
== Participation  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! All OWASP chapter meetings are free and open to anyone interested in application security and New Zealand is no different. We encourage members to give presentations on any OWASP related topic and to share their knowledge with the rest of the OWASP NZ chapter. Please also subscribe to the [https://lists.owasp.org/mailman/listinfo/owasp-newzealand OWASP NZ Mailing-list] to receive future event announcements or access previous [https://lists.owasp.org/pipermail/owasp-newzealand/ posts].&lt;br /&gt;
&lt;br /&gt;
== Upcoming Event  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For more information, please visit: [https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010]&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
== Past Events == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2010''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2010 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 4th March 2010&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' MS-SQL Injections.&lt;br /&gt;
: '''Presented By:''' Scott Bell, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''2009''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2009 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; 10th November 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' Testing AMF/Flex.&lt;br /&gt;
: '''Presented By:''' Nick Freeman, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Shared Ownership&amp;quot;, from a web security perspective.&lt;br /&gt;
: '''Presented By:''' Quintin Russ, Technical Director (Site Host)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 13th July 2009&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 https://www.owasp.org/images/8/85/Owasp_nz_logo.jpg]&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.security-assessment.com Security-Assessment.com], [http://www.lateralsecurity.com Lateral Security], [http://www.auckland.ac.nz/ The University of Auckland]&lt;br /&gt;
: '''Location:''' Auckland&lt;br /&gt;
: '''Presentations:''' [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Download] &lt;br /&gt;
: '''Event site:''' [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 19th March 2009&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:ActiveXploitation_In_2009.pptx ActiveXploitation in 2009]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:OWASP_Mar09_Reversing_JavaScript.zip Reversing JavaScript]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Senior Security Consultant (Security-Assessment.com)&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2008''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2008 --&amp;gt;&lt;br /&gt;
; 5th November 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vodafone.co.nz Vodafone New Zealand] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Common_Application_Flaws.ppt Common Application Flaws]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Brett Moore, Network Intrusion Specialist (Insomnia Security)&lt;br /&gt;
: '''Presentation:''' &amp;quot;In your Browser, Jackin your Clicks&amp;quot;&lt;br /&gt;
: '''Presented By:''' Beau Butler, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Opera Stored Cross Site Scripting&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 3rd September 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.microsoft.com/en/nz/default.aspx Microsoft] and [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Browser_security.ppt Browser Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Time_Based_SQL_Injections.ppt Time based blind SQL Injections]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Muhaimin Dzulfakar, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 25th June 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;Fuzz the Web&amp;quot;&lt;br /&gt;
: '''Presented By:''' Dean Jerkovich, Security Analyst (ASB)&lt;br /&gt;
: '''Presentation:''' &amp;quot;Hacking The World With Flash Part #2: The Results&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Crag, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; 29th April 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://security-assessment.com Security-Assessment.com]&lt;br /&gt;
: '''Locations:''' Wellington, Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Hacking_The_World_With_Flash.ppt Hacking The World With Flash]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Paul Craig, Principal Security Consultant (Security-Assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;[https://www.owasp.org/index.php/Image:Web_spam_techniques.ppt Web Spam Techniques] - also available in [http://malerisch.net/docs/web_spam_techniques/web_spam_techniques.html HTML] format&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-Assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 21st February 2008&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://www.owasp.org/index.php/Image:Xpath_Injection.ppt Xpath Injection - An Overview]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''2007''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2007 --&amp;gt;&lt;br /&gt;
; 5th December 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;[http://malerisch.net/docs/ajax_security/Ajax_security.ppt Ajax Security]&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani, Security Consultant (Security-assessment.com)&lt;br /&gt;
: '''Presentation:''' &amp;quot;On the job browser exploitation&amp;quot;&lt;br /&gt;
: '''Presented By:''' Mark Piper, Senior Security Consultant (Security-assessment.com)&lt;br /&gt;
&lt;br /&gt;
; 22nd May 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Press Release:''' [http://www.vedaadvantage.com/vantage/news_in_brief_and_events/host_nz_owasp_meeting.aspx VedaAdvantage.com]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
: '''Presentation:''' &amp;quot;OWASP in New Zealand&amp;quot;&lt;br /&gt;
: '''Presented By:''' Roberto Suggi Liverani / Antonio Spera&lt;br /&gt;
&lt;br /&gt;
; April 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
; January 2007&lt;br /&gt;
: '''Co-Sponsor:''' [http://www.vedaadvantage.com/home/home_default.aspx Veda Advantage]&lt;br /&gt;
: '''Locations:''' Auckland&lt;br /&gt;
&lt;br /&gt;
== Activities == &lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand members actively participate in various OWASP activities. The following are some recent activities undertaken by OWASP NZ members: &lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani will be speaking at OWASP AppSec Asia 2009 conference&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at Defcon 17&lt;br /&gt;
* OWASP NZ Day 2009 - [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009#tab=Presentations Presentations online]&lt;br /&gt;
* Roberto Suggi Liverani and Nick Freeman will be speaking at EUSecWest 09&lt;br /&gt;
* Brett Moore will be speaking at [http://www.owasp.org/index.php/OWASP_AU_Conference_2009 OWASP AU Conference] about &amp;quot;Vulnerabilities In Action&amp;quot;.&lt;br /&gt;
* Roberto Suggi Liverani contributed to the [http://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide v3].&lt;br /&gt;
* Mark Piper took his &amp;quot;On the job browser exploitation&amp;quot; talk to the [http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference OWASP_Australia_AppSec_2008_Conference].&lt;br /&gt;
* Rob Munro has been appointed as OWASP Evangelist&lt;br /&gt;
* OWASP NZ has audio/video conference capability between Auckland and Wellington&lt;br /&gt;
&lt;br /&gt;
== OWASP NZ Members == &lt;br /&gt;
&lt;br /&gt;
We are always looking for additional board members to evangelise the OWASP mission help with meetings, projects and initiatives as we all know it takes time/effort to run a chapter. Please contact us if you are interested to join the NZ OWASP board member or for any queries related to OWASP NZ.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Leader)&amp;lt;/b&amp;gt; [mailto:robertosl(at)owasp.org Roberto Suggi Liverani] 021 928 780&lt;br /&gt;
*&amp;lt;b&amp;gt;NZ Board Member (Evangelist)&amp;lt;/b&amp;gt; [mailto:rob(at)robmunro.com Rob Munro] 021 677 785&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The chapter mailing address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
NZ OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
17 Woodberry Drive&amp;lt;br&amp;gt;&lt;br /&gt;
Dannemora, Auckland 2016 &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85811</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85811"/>
				<updated>2010-07-04T11:00:31Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Agenda====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;7%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;  			  &amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Registration			  &lt;br /&gt;
		    &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Welcome to OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;  &lt;br /&gt;
	      &amp;lt;em&amp;gt;Roberto Suggi Liverani / Lech Janczewski - Security-Assessment.com / The University of Auckland&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Don't Try This At Home&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Brett Moore - Insomnia Security&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;9:50&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Defending Against Application Level DoS Attacks&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			    &amp;lt;em&amp;gt;Roberto Suggi Liverani - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Coffee Break&amp;lt;br /&amp;gt;&lt;br /&gt;
		    &amp;lt;br /&amp;gt;&lt;br /&gt;
		  &amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Web Application Vulnerabilities: How far does the rabbit hole go?&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Scott Bell – Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Lunch Break&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;&amp;quot;Oh F#!K&amp;quot;: What To Do When You Get Pwned&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Paul Craig - Security-Assessment.com&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Tales from the Crypt0&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Graeme Neilson / Kirk Jackson - Aura Software Security / Xero&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;Snackie Break&amp;lt;br /&amp;gt;&lt;br /&gt;
	      &amp;lt;br /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Hosting and Web Apps - The Obscurity of Security&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
              &amp;lt;em&amp;gt;Quintin Russ / Mike Jager - SiteHost / Web Drive&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:15&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;The Ramblings of an ex-QSA&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
                &amp;lt;em&amp;gt;Dean Carter&amp;lt;/em&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td bgcolor=&amp;quot;#B5B5B5&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;left&amp;quot;&amp;gt;Panel Discussion/Conclusion&amp;lt;br /&amp;gt;&lt;br /&gt;
			  &amp;lt;br /&amp;gt;&lt;br /&gt;
			&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
        &amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;/table&amp;gt;				&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85797</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85797"/>
				<updated>2010-07-03T04:13:52Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over eight years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Adobe and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85749</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85749"/>
				<updated>2010-07-01T22:48:48Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Brett Moore - Insomnia Security - &amp;quot;Don't Try This At Home&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
During source code and application reviews a number of common issues are&lt;br /&gt;
often seen. Developers making the same mistakes time and time again. There&lt;br /&gt;
are also those 'unique' issues that only come up once in a while, when&lt;br /&gt;
people handroll their own methods to solve a particular problem.&lt;br /&gt;
&lt;br /&gt;
Over the course of this talk, the speaker will explain and describe a number&lt;br /&gt;
of issues that he has seen over the last 24 months in locally developed&lt;br /&gt;
code. This is an opportunity to see what local developers are doing wrong,&lt;br /&gt;
and why you shouldn't try this at home.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Brett Moore&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having conducted vulnerability assessments, network reviews, and penetration tests for the majority of the large companies in New Zealand, Insomnia founder Brett Moore brings with him over six years experience in information security. During this time, Brett has also worked with companies such as SUN Microsystems, Skype Limited and Microsoft Corporation by reporting and helping to fix security vulnerabilities in their products. Brett has released numerous whitepapers and technical postings related to security issues and has spoken at security conferences both locally and overseas, including BlackHat, Defcon, Syscan, Kiwicon, Ruxcon, and the invitation only Microsoft internal security conference called BlueHat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Quintin Russ / Mike Jager - SiteHost / Web Drive - Hosting and Web Apps - The Obscurity of Security==&lt;br /&gt;
&lt;br /&gt;
The security of web applications has traditionally been considered to be&lt;br /&gt;
the problem of the company whose servers they were hosted upon. However,&lt;br /&gt;
while you can outsource the hosting of web apps, you cannot outsource&lt;br /&gt;
the responsibility of ensuring that those apps are secure. Mike and&lt;br /&gt;
Quintin set aside their corporate rivalry to demonstrate the gap between&lt;br /&gt;
the way things are and the way things should be.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Quintin Russ&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Quintin has carved out his own niche in the .nz hosting industry, having&lt;br /&gt;
spent a large proportion of the last few years becoming an expert in&lt;br /&gt;
both building and defending systems. He now runs enough infrastructure&lt;br /&gt;
to ensure he never, ever gets a good night's sleep, and sometimes&lt;br /&gt;
doesn't even get to snooze through Sunday mornings. Quintin has a keen&lt;br /&gt;
interest in security, especially as it relates to web hosting. This has&lt;br /&gt;
ranged from the vicissitudes of shared hosting to code reviews of&lt;br /&gt;
popular blogging applications. He has previously presented at ISIG and&lt;br /&gt;
Kiwicon 2009.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Mike Jager&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since his arrival at Web Drive in 2004, Mike has been sticking his&lt;br /&gt;
fingers into the wall sockets of web hosting. Currently, he herds&lt;br /&gt;
packets, mutters at clouds, and sneaks up on web applications, tricking&lt;br /&gt;
them into scaling horizontally when they least expect it. Mike holds a&lt;br /&gt;
BE in Computer Systems Engineering from the University of Auckland, and&lt;br /&gt;
has been spotted presenting recently at NZNOG, APRICOT and the&lt;br /&gt;
occasional ISIG meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roberto Suggi Liverani - Security-Assessment.com - Defending Against Application Level DoS Attacks==&lt;br /&gt;
&lt;br /&gt;
Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating application level DoS attacks.&lt;br /&gt;
These attacks often result in significant damage against unprepared and vulnerable organisations.&lt;br /&gt;
&lt;br /&gt;
The intent of this talk is to help organisations in strengthening their security posture against such attacks. The talk will explore most common application level DoS attacks and will provide recommendations for protecting applications, detecting attacks and how to react under stressful conditions.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Roberto Suggi Liverani&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Roberto Suggi Liverani is a senior security consultant for Security-Assessment.com. He is the founder and &lt;br /&gt;
leader of the OWASP (Open Web Application Security Project) in New Zealand.  Roberto has worked with &lt;br /&gt;
companies such as Google, Oracle and Opera by reporting and helping to fix security vulnerabilities in their &lt;br /&gt;
products. Roberto is the co-author of the most recent OWASP Testing Guide and has spoken at various &lt;br /&gt;
security conferences around the globe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85665</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85665"/>
				<updated>2010-06-30T00:39:33Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			30th June 2010&lt;br /&gt;
* Contributions submission deadline: 			10th July 2010 &lt;br /&gt;
* Registration deadline: 				30th June 2010&lt;br /&gt;
* Conference Agenda due: 				2nd July 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85664</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85664"/>
				<updated>2010-06-30T00:38:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP is now closed.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			15th June 2010&lt;br /&gt;
* Contributions submission deadline: 			25th June 2010 &lt;br /&gt;
* Registration deadline: 				20th June 2010&lt;br /&gt;
* Conference Agenda due: 				20th June 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85662</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85662"/>
				<updated>2010-06-30T00:35:26Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration is now closed.&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP will close on the 30th June 2010.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (CLOSED)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (CLOSED) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			15th June 2010&lt;br /&gt;
* Contributions submission deadline: 			25th June 2010 &lt;br /&gt;
* Registration deadline: 				20th June 2010&lt;br /&gt;
* Conference Agenda due: 				20th June 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85476</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85476"/>
				<updated>2010-06-27T20:48:08Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Entry to the event is '''free'''. Registration is mandatory in order to attend. To register at the conference, please click the registration link below:&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[http://owaspnzday2010.eventbrite.com https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP will close on the 30th June 2010.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (OPEN)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (OPEN) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			15th June 2010&lt;br /&gt;
* Contributions submission deadline: 			25th June 2010 &lt;br /&gt;
* Registration deadline: 				20th June 2010&lt;br /&gt;
* Conference Agenda due: 				20th June 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85474</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85474"/>
				<updated>2010-06-27T11:53:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Entry to the event is '''free'''. Registration is mandatory in order to attend. To register at the conference, please click the registration link below:&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[http://owaspnzday2010.eventbrite.com https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP will close on the 30th June 2010.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (OPEN)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (OPEN) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			15th June 2010&lt;br /&gt;
* Contributions submission deadline: 			25th June 2010 &lt;br /&gt;
* Registration deadline: 				20th June 2010&lt;br /&gt;
* Conference Agenda due: 				20th June 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;Department of Computer Science&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85146</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=85146"/>
				<updated>2010-06-20T23:34:09Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Entry to the event is '''free'''. Registration is mandatory in order to attend. To register at the conference, please click the registration link below:&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[http://owaspnzday2010.eventbrite.com https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP will close on the 30th June 2010.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (OPEN)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (OPEN) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			15th June 2010&lt;br /&gt;
* Contributions submission deadline: 			25th June 2010 &lt;br /&gt;
* Registration deadline: 				20th June 2010&lt;br /&gt;
* Conference Agenda due: 				20th June 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;Department of Computer Science&amp;lt;br&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=84996</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=84996"/>
				<updated>2010-06-16T21:37:25Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Entry to the event is '''free'''. Registration is mandatory in order to attend. To register at the conference, please click the registration link below:&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[http://owaspnzday2010.eventbrite.com https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
==Scott Bell - Web Application Vulnerabilities: How far does the rabbit hole go?== &lt;br /&gt;
&lt;br /&gt;
We all know SQL Injection and File Inclusion bugs are dangerous. We know they can be used to 'hack you'. But what does this really mean? Do you know the true impact of these bugs? You might think you know the answers, but do you? In this presentation, we will be covering the risk and impact of such vulnerabilities and a demonstration will be shown on how far these bugs can be leveraged.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Scott Bell&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Scott Bell is a security consultant at Security-Assessment.com. He has been involved with IT security for seven years and has a passion for Web Application security. Scott has a PhD in reverse-shell-ology and previously performed penetration testing at Yahoo! Inc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Dean Carter - The Ramblings of an ex-QSA== &lt;br /&gt;
&lt;br /&gt;
As a QSA there were a bunch of things Dean was forbidden from discussing.&lt;br /&gt;
&lt;br /&gt;
As an ex QSA some of these matters will remain firmly sequestered inside his kimono - but others things, more general things, can now be shared.&lt;br /&gt;
&lt;br /&gt;
Dean has 30 minutes worth of handy tips, hints, lessons and some brickbats relating to PCI and secure system development that he can now share with the community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dean Carter&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dean still remembers the day he first heard about the PCI DSS - he then spent several years trying to convince everyone that the PCI DSS was the bestest thing since the Beatles… not many people listened… they had projects to finish and settings to tweak… &lt;br /&gt;
&lt;br /&gt;
Then Dean joined Security-Assessment.com and became a QSA (PCI power-up!)… people listened! Organisations even paid to listen! A few organisations went so far as to demonstrate their security posture to Dean The QSA. In return he signed their Reports on Compliance. Most made great progress towards compliance… while some simply went in political circles and denied the need to make any effort.&lt;br /&gt;
&lt;br /&gt;
Two years on Dean, the ex-QSA, now works for financial institution where, in between other tasks, he regularly sticks his nose into PCI matters and  still firmly believes that the PCI DSS is a positive thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Paul Craig – Security-Assessment.com - &amp;quot;Oh F#!K&amp;quot; : What To Do When You Get Pwned==&lt;br /&gt;
&lt;br /&gt;
If your company’s website were hacked tomorrow, would you know what to do?&lt;br /&gt;
Forensics is not what you see on CSI, and most people have no idea what they should do in the event of a compromise.  What is an appropriate incident response for a company, what do you say to your CEO, when do you involve law enforcement? Do you attempt to solve the forensic case yourself; keeping in mind any action you take may directly affect the evidence, or compromise legal judicial requirements.&lt;br /&gt;
This presentation will demonstrate the forensic process for a compromised website, and what an organization should do when they find out they have been compromised. I will use case studies from previous incidents and demonstrate what you should and shouldn’t do when you get pwned.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Paul Craig&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
My name is Paul Craig, I work as the lead forensic incident responder at Security-Assessment.com and I work with many New Zealand companies who have been compromised. From small websites to large corporations and government agencies, our nation is regularly being defaced and defrauded.  IT Forensics is here to pick up the pieces, and it’s my job to spend long nights trying to provide answers to businesses regarding what really happened.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Graeme Neilson / Kirk Jackson - Aura Software Security / Xero - Tales from the Crypt0==&lt;br /&gt;
&lt;br /&gt;
Does the thought of SSL, HTTPS and S/MIME make you squeamish?&lt;br /&gt;
Does PKI make you want to scream?&lt;br /&gt;
Does encrypting data at rest make you want to bury yourself alive?&lt;br /&gt;
&lt;br /&gt;
Cryptography is an important part of most web applications these days,&lt;br /&gt;
and developers and admins need to understand how, why and when to&lt;br /&gt;
employ the best and appropriate techniques to secure their servers,&lt;br /&gt;
applications, data and the livelihoods of their users.&lt;br /&gt;
&lt;br /&gt;
Join Graeme Neilson (Aura Software Security) and Kirk Jackson (Xero)&lt;br /&gt;
for a series of scary stories in &amp;quot;Tales from the Crypt0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Graeme Neilson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Graeme Neilson is lead security researcher at Aura Software Security,&lt;br /&gt;
a security consultancy based in Wellington with clients across the globe.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Kirk Jackson&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirk Jackson is a developer at Xero, makers of the world's easiest&lt;br /&gt;
accounting system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that CFP will close on the 30th June 2010.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (OPEN)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (OPEN) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			15th June 2010&lt;br /&gt;
* Contributions submission deadline: 			25th June 2010 &lt;br /&gt;
* Registration deadline: 				20th June 2010&lt;br /&gt;
* Conference Agenda due: 				20th June 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;Department of Computer Science&amp;lt;br&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=83754</id>
		<title>OWASP New Zealand Day 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_New_Zealand_Day_2010&amp;diff=83754"/>
				<updated>2010-05-20T04:39:36Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: /* Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
====Introduction====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''OWASP New Zealand Day 2010&amp;lt;br&amp;gt;15th July - Auckland'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 http://www.owasp.org/images/a/a7/Owasp_nz_day_2010.jpg]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
Following the success of the [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2009 OWASP New Zealand 2009] security conference which attracted more than 150 attendees, the [http://www.owasp.org/index.php/New_Zealand OWASP New Zealand Chapter] decided to organise the &amp;lt;b&amp;gt;OWASP New Zealand Day 2010&amp;lt;/b&amp;gt;. The event will be held on the &amp;lt;b&amp;gt;15th July 2010&amp;lt;/b&amp;gt; in &amp;lt;b&amp;gt;Auckland&amp;lt;/b&amp;gt;. For those people who missed the first OWASP New Zealand Day, this is a national security conference entirely dedicated to web application security. The intent of the conference is to promote and raise web application security awareness in New Zealand. IT professionals, including security professionals,  developers, managers and students are invited to partecipate to this conference.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Entry to the event is '''free'''. Registration is mandatory in order to attend. To register at the conference, please click the registration link below:&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[http://owaspnzday2010.eventbrite.com https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==When &amp;amp; Where==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;When&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
Thursday, July 15, 2010 from 9:00 AM - 6:00 PM (GMT+1200)&lt;br /&gt;
&lt;br /&gt;
Add to Calendar:&lt;br /&gt;
* [https://login.yahoo.com/?.done=http://calendar.yahoo.com/%3Fv%3D60%26view%3Dd%26type%3D20%26title%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26st%3D20100714T210000Z%26dur%3D0900%26desc%3DFor%2Bdetails,%2Blink%2Bhere:%2Bhttp://owaspnzday2010.eventbrite.com%26in_loc%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Yahoo Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=outlook Outlook Calendar]&lt;br /&gt;
* [https://www.google.com/accounts/ServiceLogin?service=cl&amp;amp;passive=1209600&amp;amp;continue=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand&amp;amp;followup=http://www.google.com/calendar%3Faction%3DTEMPLATE%26text%3DOWASP%2BNew%2BZealand%2BDay%2B2010%26dates%3D20100714T210000Z%252F20100715T060000Z%26details%3DFor%2Bdetails%252C%2Blink%2Bhere%253A%2Bhttp%253A%252F%252Fowaspnzday2010.eventbrite.com%26location%3DThe%2BUniversity%2Bof%2BAuckland%2BBusiness%2BSchool%2B-%2BOwen%2BG.%2BGlenn%2BBuilding%2B-%2B12%2BGrafton%2BRoad%2B-%2BAuckland%2B-%2BNew%2BZealand Google Calendar]&lt;br /&gt;
* [http://www.eventbrite.com/calendar.ics?eid=678083165&amp;amp;calendar=ical iCal Calendar]&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;33%&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Where&amp;lt;/b&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td valign=&amp;quot;top&amp;quot;&amp;gt;[[Image:Auckland_business_school_small2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
==Conference structure and schedule==&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
Speakers will be announced at the end of June 2010.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Please note that [http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010#tab=Call_for_Paper_.28OPEN.29_and_review_process CFP] is now open.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call For Sponsorships (OPEN)====&lt;br /&gt;
 &lt;br /&gt;
The aims of OWASP - New Zealand community is to guarantee access to the conference for free in order to allow for wide participation and empower the community itself. As so the OWASP - New Zealand community encourages Industries, Research Institutions and Individuals to sponsor their activities and events.&lt;br /&gt;
 &lt;br /&gt;
Three types of sponsorships are available:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;b&amp;gt;Support Sponsorships&amp;lt;/b&amp;gt;: n/a - company covers expenses for international speaker / media company that provides article/coverage on the event&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Silver sponsorship&amp;lt;/b&amp;gt;: 1500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* &amp;lt;b&amp;gt;Gold Sponsorship&amp;lt;/b&amp;gt;: 3500 NZD&lt;br /&gt;
&lt;br /&gt;
- Publication of the sponsor logo on the event web site;&amp;lt;br&amp;gt;&lt;br /&gt;
- Publication of the sponsor logo on the OWASP New Zealand Chapter page;&amp;lt;br&amp;gt;&lt;br /&gt;
- The publication of the sponsor logo in the event site, in the agenda, on the flyers, brochure and in all the official communications with the attendees at the conference;&amp;lt;br&amp;gt;&lt;br /&gt;
- The possibility to distribute the company brochures, CDs or other materials to the participants during the event;&amp;lt;br&amp;gt;&lt;br /&gt;
- Sponsor dedicated space at the conference (sponsor booth) to show products/services to the attendees during coffee breaks, lunch and snack breaks.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Those who are interested in sponsoring OWASP New Zealand 2010 Conference can contact the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsors can also make us of the following PayPal button to make payments. Donations are also more than welcome from the NZ community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td bordercolor=&amp;quot;#FF6600&amp;quot; bgcolor=&amp;quot;#FFFFFF&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;paypal&amp;gt;OWASP New Zealand Day 2010&amp;lt;/paypal&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Call for Paper (OPEN) and review process====&lt;br /&gt;
&lt;br /&gt;
OWASP solicit contributions on the above topics, or general matters of interest to the community. Those who are interested in participating as speakers to the conference can submit an abstract of the speech to the [mailto:robertosl@owasp.org OWASP New Zealand Board].&amp;lt;br&amp;gt;&lt;br /&gt;
The email subject must be “OWASP New Zealand 2010: CFP” and  the email body must contains the following information/sections:&lt;br /&gt;
&lt;br /&gt;
* Name and Surname&lt;br /&gt;
* Affiliation &lt;br /&gt;
* Address  &lt;br /&gt;
* Telephone number&lt;br /&gt;
* Email address&lt;br /&gt;
* List of the author’s previous papers/articles/speeches on the same topics &lt;br /&gt;
* Title of the contribution  &lt;br /&gt;
* Type of contribution: Technical or Informative  &lt;br /&gt;
* Abstract (max one A4 style page)&lt;br /&gt;
* Why the contribution is relevant for OWASP New Zealand 2010&lt;br /&gt;
* If you are not from New Zealand, will your company support your expenses - Yes/No&lt;br /&gt;
&lt;br /&gt;
The submission will be reviewed by the OWASP New Zealand Board and the most interesting ones will be selected and invited for presentation.&lt;br /&gt;
&lt;br /&gt;
Due to limited budget available, expenses for international speakers cannot be covered.&lt;br /&gt;
If your company is willing to cover travel and accomodation costs, the company will become &amp;quot;Support Sponsor&amp;quot; of the event.&lt;br /&gt;
&lt;br /&gt;
====Conference====&lt;br /&gt;
&lt;br /&gt;
==Conference Venue==&lt;br /&gt;
&lt;br /&gt;
The University of Auckland Business School&amp;lt;br&amp;gt;&lt;br /&gt;
Owen G Glenn Building&amp;lt;br&amp;gt;&lt;br /&gt;
Room: OGGB 260-073 (OGGB4)&amp;lt;br&amp;gt;&lt;br /&gt;
Address: 12 Grafton Road&amp;lt;br&amp;gt;&lt;br /&gt;
Auckland&amp;lt;br&amp;gt;&lt;br /&gt;
New Zealand&amp;lt;br&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?oe=UTF-8&amp;amp;ie=UTF8&amp;amp;q=auckland+business+school&amp;amp;fb=1&amp;amp;split=1&amp;amp;cid=0,0,12303692579639430581&amp;amp;ei=6WeqSZr_OZLFkAWR--zbDQ&amp;amp;ll=-36.852308,174.770916&amp;amp;spn=0.01056,0.020621&amp;amp;z=16&amp;amp;iwloc=A Map]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:Auckland_business_school_small2.jpg]] [[Image:Room_hall.jpg]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Topics==&lt;br /&gt;
&lt;br /&gt;
The OWASP Days have always offered a forum for discussion and exchange of ideas among researchers and practitioners who present their experiences and discuss issues related to Web Application Security from a higher level to a technical point of view.&lt;br /&gt;
&lt;br /&gt;
Conference topics include, but are not limited to:&lt;br /&gt;
&lt;br /&gt;
* OWASP Project presentation (i.e Tool Updates/Project Status etc);&lt;br /&gt;
* Threat modelling of web applications;&lt;br /&gt;
* Privacy concerns with applications and data storage;&lt;br /&gt;
* Vulnerability analysis of web applications (code review, pentest, static analysis, scanning);&lt;br /&gt;
* Baseline or metrics for web application security;&lt;br /&gt;
* Countermeasures for web application vulnerabilities;&lt;br /&gt;
* Web application security;&lt;br /&gt;
* Platform or language (e.g. Java, .NET) security features that help secure web applications;&lt;br /&gt;
* Secure application development;&lt;br /&gt;
* How to use databases securely in web applications;&lt;br /&gt;
* Security of Service Oriented Architectures;&lt;br /&gt;
* Access control in web applications;&lt;br /&gt;
* Web services security;&lt;br /&gt;
* Browser security;&lt;br /&gt;
* PCI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Conference structure and schedule===&lt;br /&gt;
&lt;br /&gt;
OWASP New Zealand Day 2010 will be all day Conference. The conference aims to provide a workshop-like atmosphere in which contributions can be presented and then time is allowed for constructive discussion of their results and processes. It will be structured in a single stream. During the conference two coffee breaks (one in the morning and one in the afternoon) and the lunch are in program. These might be offered by the sponsors.  The detailed agenda of the conference will be available on the web site before the event.&lt;br /&gt;
&lt;br /&gt;
====Conference dates====&lt;br /&gt;
&lt;br /&gt;
* CFP close:  			 			15th June 2010&lt;br /&gt;
* Contributions submission deadline: 			25th June 2010 &lt;br /&gt;
* Registration deadline: 				20th June 2010&lt;br /&gt;
* Conference Agenda due: 				20th June 2010 &lt;br /&gt;
* Conference date: 					15th July 2010 &lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
'''OWASP New Zealand Day 2010 Organising Committee:'''&lt;br /&gt;
&lt;br /&gt;
* Roberto Suggi Liverani – OWASP New Zealand Leader&lt;br /&gt;
* Rob Munro – OWASP New Zealand Evangelist&lt;br /&gt;
* Lech Janczewski - Associate Professor - University of Auckland&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.auckland.ac.nz/ https://www.owasp.org/images/8/82/University_of_Auckland_crest_small.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;bottom&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;[http://www.security.org.nz/NZISF_NZISForumContent.php https://www.owasp.org/images/5/5a/Nz_information_security_forum.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;lt;center&amp;gt;Department of Computer Science&amp;lt;br&amp;gt;ICT and Department of Information Systems and Operations Management&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gold Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com https://www.owasp.org/images/a/a4/Security-assessment_com.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.security-assessment.com www.security-assessment.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Silver Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ https://www.owasp.org/images/f/f4/Lateral_security.jpeg]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.lateralsecurity.com/ www.lateralsecurity.com]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Support Sponsors:'''&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ http://www.owasp.org/images/1/1d/Netguide-logo.png]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;lt;center&amp;gt;[http://www.techday.co.nz/netguide/ www.techday.co.nz/netguide]&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Netguide-logo.png&amp;diff=83753</id>
		<title>File:Netguide-logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Netguide-logo.png&amp;diff=83753"/>
				<updated>2010-05-20T04:30:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rsl81: uploaded a new version of &amp;quot;File:Netguide-logo.png&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rsl81</name></author>	</entry>

	</feed>