<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sandra+Paiva</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sandra+Paiva"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Sandra_Paiva"/>
		<updated>2026-04-26T00:13:24Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=115072</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Multiple Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=115072"/>
				<updated>2011-08-04T18:05:25Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last updated 4 Aug 11&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions - Multiple Select'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Which of the following consequences are most likely to occur due to  an injection attack? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Spoofing &lt;br /&gt;
# Data loss '''Correct'''&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) Which of the following scenarios are most likely to cause an injection attack? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Unvalidated input is embedded in an instruction stream. '''Correct'''&lt;br /&gt;
# Unvalidated input cannot be distinguished from valid instructions. '''Correct'''&lt;br /&gt;
# A Web application does not validate a client’s access to a resource. &lt;br /&gt;
# A Web action performs an operation on behalf of the user without checking a shared secret. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5) Which of the following are the best ways to protect against injection attacks? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Escaping '''Correct'''&lt;br /&gt;
# Memory size checks&lt;br /&gt;
# Validate integer values before referencing arrays&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6) Which of the following are most vulnerable to injection attacks? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Session IDs&lt;br /&gt;
# Registry keys &lt;br /&gt;
# Regular expressions '''Correct'''&lt;br /&gt;
# SQL queries based on user input '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8) Which mitigation techniques when used in combination can help you strictly define valid input? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9) Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Table indirection '''Correct'''&lt;br /&gt;
# Escaping &lt;br /&gt;
# Object class for user input '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14) Which of the following languages are the primary targets of cross-site scripting? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# HTML '''Correct'''&lt;br /&gt;
# SQL &lt;br /&gt;
# XSLT&lt;br /&gt;
# JavaScript '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18) Which of the following are the best ways to prevent malicious input exploiting your application? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Using allow List '''Correct'''&lt;br /&gt;
# Using block list '''Correct'''&lt;br /&gt;
# Using escaping '''Correct'''&lt;br /&gt;
# Using encryption &lt;br /&gt;
# Using table indirection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
22) Which of the following input sources can be directly controlled by a malicious user? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Window.location '''Correct'''&lt;br /&gt;
# GET/POST parameters '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
# Ports and network resources &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
23) Which of the following scenarios are most likely to result in broken authentication and session management vulnerabilities? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Poorly implemented custom code is used. '''Correct'''&lt;br /&gt;
# Misconfigured off-the-shelf code is used. '''Correct'''&lt;br /&gt;
# Unused and unnecessary services, code, and DLLs are disabled. &lt;br /&gt;
# The HttpOnly flag is set in cookies. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
24) Which of the following actions should you take before implementing a custom authentication and session management system? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Find out if a suitable framework component already exists. '''Correct'''&lt;br /&gt;
# Find out if you can use a small extension to an existing component to implement the system. '''Correct'''&lt;br /&gt;
# Find out if form variables are available to store data. &lt;br /&gt;
# Find out if you need to use session-based indirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
26) Which of the following functionalities should you include in an authentication and session management system? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Logout functionality '''Correct'''&lt;br /&gt;
# Inactivity timeout functionality '''Correct'''&lt;br /&gt;
# Escaping functionality&lt;br /&gt;
# Forwarding system functionality&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
31) Which of the following are authentication system mandatory requirements? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Strong passwords are required. '''Correct'''&lt;br /&gt;
# Use a GOTCHA to prevent automated attacks.&lt;br /&gt;
# User logout and session inactivity are required. '''Correct'''&lt;br /&gt;
# Session IDs are only accepted from cookies and parameter variables.&lt;br /&gt;
# Credentials are always protected with encryption or cryptographic salting and hashing. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
32) A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# It should identify returning users to the site. &lt;br /&gt;
# It should be used as a replacement for a user's credentials. '''Correct'''&lt;br /&gt;
# It should always use a persistent cookie. &lt;br /&gt;
# It should always use a non-persistent cookie. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
34) Which of the following tasks are performed by a session-based system? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Identifying returning users '''Correct'''&lt;br /&gt;
# Providing access to restricted resources '''Correct'''&lt;br /&gt;
# Using the HTTP protocol &lt;br /&gt;
# Sending successful logins to a well-known location &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
36) Which of the following objects are most susceptible to an insecure direct object reference attack? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Files '''Correct'''&lt;br /&gt;
# Registry keys '''Correct'''&lt;br /&gt;
# Conditional constructs &lt;br /&gt;
# GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
37) Which of the following vulnerabilities are most likely to occur due to an insecure direct object reference attack? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Executing commands on the server.&lt;br /&gt;
# Impersonating any user on the system.&lt;br /&gt;
# Modifying SQL data pointed to by the query.&lt;br /&gt;
# Modifying data without authorization. '''Correct'''&lt;br /&gt;
# Accessing a resource without authorization. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
38) Which of the following are the best ways to mitigate the threat of an insecure direct object reference attack? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Use session-based indirection. '''Correct'''&lt;br /&gt;
# Use POST parameters instead of GET parameters. &lt;br /&gt;
# Perform an access check each time a resource identifier arrives as input. '''Correct'''&lt;br /&gt;
# Send successful logins to a well-known location instead of automatic redirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
41) Which of the following threats are most likely to be caused by poor input validation? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Cross-site scripting '''Correct'''&lt;br /&gt;
# Insecure direct object reference '''Correct''' &lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Insufficient transport layer protection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
43) Which of the following are the most common results of a cross-site request forgery? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Elevation of privilege '''Correct'''&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Spoofing and tampering '''Correct'''&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Misconfigured or disabled security features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
49) Which of the following are most often associated with a security misconfiguration threat? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Unused services '''Correct'''&lt;br /&gt;
# Default accounts '''Correct'''&lt;br /&gt;
# Bad cryptography &lt;br /&gt;
# Unsafe key storage &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
51) Which of the following are the best ways to reevaluate your environment and address new threats? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Add or remove network segments. '''Correct'''&lt;br /&gt;
# Apply the latest service packs, patches, hotfixes, and updates. '''Correct'''&lt;br /&gt;
# Use custom cryptographic algorithms. &lt;br /&gt;
# Use your browser to forge unauthorized requests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
52) Which of the following procedures are involved in the hardening process? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Disable unnecessary features. '''Correct'''&lt;br /&gt;
# Review all settings/configurations. '''Correct'''&lt;br /&gt;
# Repeat the process at random intervals.&lt;br /&gt;
# Update the environment with changes only when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
53) Which of the following consequences are most likely to result if your production environment does not match your development, testing, and staging environments? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Your application may not work as expected. '''Correct'''&lt;br /&gt;
# Your application may not authenticate users as expected. '''Correct''' &lt;br /&gt;
# Your application may be expensive to administer.&lt;br /&gt;
# Your application may have too many configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
54) Which of the following can result in insecure cryptography? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# Unused services&lt;br /&gt;
# Default accounts &lt;br /&gt;
# Failure to rotate keys '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
55) Which of the following are most likely to result in insecure cryptography? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Custom cryptographic algorithms '''Correct'''&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# New products &lt;br /&gt;
# Missing patches&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
56) Which of the following may result in cryptographic weakness? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Poor/weak algorithm choice '''Correct'''&lt;br /&gt;
# Custom cryptographic algorithms '''Correct'''&lt;br /&gt;
# Insufficient cryptographic protocols '''Correct'''&lt;br /&gt;
# Missing patches&lt;br /&gt;
# Unnecessary/unused services or features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
57) Which of the following protocols are network layer encryption protocols? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# EFS &lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
58) Which of the following factors help you secure keys? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Complexity '''Correct'''&lt;br /&gt;
# Rotation '''Correct'''&lt;br /&gt;
# Randomness '''Correct'''&lt;br /&gt;
# Encryption &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
60) Which of the following depict the typical impact of failure to restrict URL access? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Attackers access other users’ accounts and data. '''Correct'''&lt;br /&gt;
# Attackers impersonate any user on the system.&lt;br /&gt;
# Attackers invoke functions and services they have no authorization for. '''Correct'''&lt;br /&gt;
# Attackers perform all actions that the victims themselves have permission to perform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
61) Which of the following actions should you take to verify the implementation of your Web application? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Use policy mechanisms. &lt;br /&gt;
# Use a simple and positive model at every layer. &lt;br /&gt;
# Verify that each URL in your application is appropriately protected. '''Correct'''&lt;br /&gt;
# Use your browser to forge unauthorized requests. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
62) Which of the following should you use to protect the connections between the physical tiers of your application? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# EFS &lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
63) Which of the following are the best ways to implement transport layer protection? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Install IDS&lt;br /&gt;
# Enable SSL '''Correct'''&lt;br /&gt;
# Set the HttpOnly flag on session ID cookies &lt;br /&gt;
# Enable IPSec '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
65) Which of the following are the best ways to protect a Web application from unvalidated redirects and forwards? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Validate the referrer header '''Correct'''&lt;br /&gt;
# Use extended validation certificates &lt;br /&gt;
# Validate all input from the client '''Correct'''&lt;br /&gt;
# Disallow requests to unauthorized file types &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
69) In which of the following scenarios should you use the escaping technique? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# When user input is echoed back to the user in HTML '''Correct'''&lt;br /&gt;
# When you need to validate any input as valid input &lt;br /&gt;
# When you are trying to protect against regular expression injection &lt;br /&gt;
# When you need to tell the interpreter that input is data and not code '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
70) Which of the following are the best ways to prevent unvalidated redirect and forwards vulnerabilities? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Use an allow list, such as table indirection. '''Correct'''&lt;br /&gt;
# Use client-side validation. &lt;br /&gt;
# Allow only relative redirects. '''Correct'''&lt;br /&gt;
# Use session-based indirection.&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=115071</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Single Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=115071"/>
				<updated>2011-08-04T17:49:49Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last updated 4 Aug 11&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions - Single Select'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Which of the following consequences is most likely to occur due to an injection attack? &lt;br /&gt;
&lt;br /&gt;
# Spoofing &lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application?&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) Which of the following scenarios is most likely to cause an injection attack?&lt;br /&gt;
&lt;br /&gt;
# Unvalidated input is embedded in an instruction stream. '''Correct'''&lt;br /&gt;
# Unvalidated input can be distinguished from valid instructions. &lt;br /&gt;
# A Web application does not validate a client’s access to a resource. &lt;br /&gt;
# A Web action performs an operation on behalf of the user without checking a shared secret. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4) A user is able to pass malicious input that invokes control codes in your Web application. Which vulnerability is most likely to occur in your Web application?&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5) Which of the following is the best way to protect against injection attacks?&lt;br /&gt;
&lt;br /&gt;
# SQL queries based on user input&lt;br /&gt;
# Input validation using an allow list '''Correct'''&lt;br /&gt;
# Memory size checks&lt;br /&gt;
# Validate integer values before referencing arrays&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6) Which of the following is most vulnerable to injection attacks?&lt;br /&gt;
&lt;br /&gt;
# Session IDs&lt;br /&gt;
# Registry keys &lt;br /&gt;
# Regular expressions '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
7) Which character is most likely to be used for an SQL injection attack? &lt;br /&gt;
&lt;br /&gt;
# Single quote (') '''Correct'''&lt;br /&gt;
# Null (\0) byte&lt;br /&gt;
# Less than sign(&amp;lt;)&lt;br /&gt;
# Greater than sign(&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8) Which mitigation technique can help you strictly define valid input?&lt;br /&gt;
&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Memory size checks &lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9) Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Table indirection '''Correct'''&lt;br /&gt;
# Escaping &lt;br /&gt;
# Memory size checks &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10) Which mitigation technique helps you tell the parser that a specific character is a literal and not a control character? &lt;br /&gt;
&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Allow list &lt;br /&gt;
# Escaping '''Correct'''&lt;br /&gt;
# Block list &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11) State whether the following statement is True or False.&lt;br /&gt;
You should use a blacklist wherever possible; use whitelists only as a secondary defense. &lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12) Which of the following is the best way to define disallowed inputs? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13) Which of the following are injection attacks?&lt;br /&gt;
&lt;br /&gt;
# Cross-site scripting '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Broken authentication and session management&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14) Which of the following languages are the primary targets of cross-site scripting? &lt;br /&gt;
&lt;br /&gt;
# HTML '''Correct'''&lt;br /&gt;
# SQL &lt;br /&gt;
# XSLT&lt;br /&gt;
# XPath &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15) Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?&lt;br /&gt;
&lt;br /&gt;
# Reflected XSS '''Correct''' &lt;br /&gt;
# Persistent XSS &lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
# Failure to restrict URL access&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
16) Which of the following is the best way to prevent a DOM-based XSS attack? &lt;br /&gt;
&lt;br /&gt;
# Set the HttpOnly flag in cookies &lt;br /&gt;
# Ensure that session IDs are not exposed in a URL &lt;br /&gt;
# Ensure that a different nonce is created for each request &lt;br /&gt;
# Validate any input that comes from another Web site '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
17) How does malicious input flow in a DOM-based XSS? &lt;br /&gt;
&lt;br /&gt;
# From server to client&lt;br /&gt;
# From client to itself '''Correct'''&lt;br /&gt;
# From attacker to server &lt;br /&gt;
# From victim to server &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18) Which of the following is the best way to prevent malicious input exploiting your application?&lt;br /&gt;
&lt;br /&gt;
# Input validation using an allow List '''Correct'''&lt;br /&gt;
# Using encryption &lt;br /&gt;
# Using table indirection&lt;br /&gt;
# Using GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19) You should set the HttpOnly flag in a cookie to ensure that:&lt;br /&gt;
&lt;br /&gt;
# The cookie is not available to client scripts. '''Correct'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser.&lt;br /&gt;
# The cookie is sent over an encrypted channel. &lt;br /&gt;
# The cookie is a persistent cookie.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20) You should set a secure flag in a cookie to ensure that:&lt;br /&gt;
&lt;br /&gt;
# The cookie is a persistent cookie.&lt;br /&gt;
# The cookie is not available to client script. &lt;br /&gt;
# The cookie is sent over an encrypted channel. '''Correct'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
21) An attacker submits data to the server and the data is stored on the server. Which type of vulnerability is most likely to occur in your application? &lt;br /&gt;
&lt;br /&gt;
# DOM-based XSS &lt;br /&gt;
# Reflected XSS &lt;br /&gt;
# Persistent XSS '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
22) Which of the following input sources can be directly controlled by a malicious user? &lt;br /&gt;
&lt;br /&gt;
# GET/POST parameters '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
# Ports &lt;br /&gt;
# Server code&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
23) Which of the following scenarios is most likely to result in broken authentication and session management vulnerabilities? &lt;br /&gt;
&lt;br /&gt;
# Poorly implemented custom code is used. '''Correct'''&lt;br /&gt;
# Session-based indirection is used.&lt;br /&gt;
# Unused and unnecessary services, code, and DLLs are disabled. &lt;br /&gt;
# The HttpOnly flag is set in cookies. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
24) Which of the following actions should you take before implementing a custom authentication and session management system? &lt;br /&gt;
&lt;br /&gt;
# Find out if the HttpOnly flag is set in cookies.&lt;br /&gt;
# Find out if you can use a small extension to an existing component to implement the system. '''Correct'''&lt;br /&gt;
# Find out if form variables are available to store data. &lt;br /&gt;
# Find out if you need to use session-based indirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
25) State whether the following statement is True or False.&lt;br /&gt;
When implementing an authentication or session system, you should ensure that new session IDs are not created at login.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
26) Which of the following functionalities should you include in an authentication and session management system? &lt;br /&gt;
&lt;br /&gt;
# Logout functionality '''Correct'''&lt;br /&gt;
# Regular expressions&lt;br /&gt;
# Escaping functionality&lt;br /&gt;
# Forwarding system functionality&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
27) Why should you use CAPTCHA? &lt;br /&gt;
&lt;br /&gt;
# To create cryptographically random session IDs &lt;br /&gt;
# To protect credentials by using encryption or cryptographic salt and hash &lt;br /&gt;
# To protect authentication systems from automated or brute-force attacks '''Correct'''&lt;br /&gt;
# To ensure that authentication systems implement inactivity timeout functionality &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
28) What should you do before passing credentials over the network? &lt;br /&gt;
&lt;br /&gt;
# Replace the credentials with a cryptographic salt and hash. '''Correct'''&lt;br /&gt;
# Accept session IDs from URLs. &lt;br /&gt;
# Share the credentials with the client. &lt;br /&gt;
# Use persistent cookies to manage session IDs. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
29) Which location should you ideally use to store a session ID?&lt;br /&gt;
&lt;br /&gt;
# URLs &lt;br /&gt;
# Form variables&lt;br /&gt;
# Persistent cookies &lt;br /&gt;
# Non-persistent cookies '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
30) Which of the following is the best way to ensure that JavaScript cannot be used to access a cookie?&lt;br /&gt;
&lt;br /&gt;
# Set the secure flag in the cookie &lt;br /&gt;
# Set the HttpOnly flag in the cookie '''Correct'''&lt;br /&gt;
# Use the CAPTCHA system&lt;br /&gt;
# Use non-persistent cookies &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
31) Which of the following is an authentication system mandatory requirement? &lt;br /&gt;
&lt;br /&gt;
# Form variables are used for managing session IDs.&lt;br /&gt;
# Use a GOTCHA to prevent automated attacks.&lt;br /&gt;
# User logout and session inactivity controls. '''Correct'''&lt;br /&gt;
# Session IDs are only accepted from cookies and parameter variables.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
32) A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? &lt;br /&gt;
&lt;br /&gt;
# It should identify returning users to the site. &lt;br /&gt;
# It should be public information.&lt;br /&gt;
# It should always use a persistent cookie. &lt;br /&gt;
# It should always use a non-persistent cookie. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
33) State whether the following statement is True or False.&lt;br /&gt;
An identification token is a replacement for a user’s credentials and should allow access to restricted resources of a Web site.&lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
34) Which of the following tasks is performed by a session-based system? &lt;br /&gt;
&lt;br /&gt;
# Identifying returning users '''Correct'''&lt;br /&gt;
# Using form variables for managing session IDs &lt;br /&gt;
# Using the HTTP protocol &lt;br /&gt;
# Sending successful logins to a well-known location &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
35) Which threat is most likely to occur when a Web application fails to validate a client's access to a resource?&lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
36) Which of the following objects is most susceptible to an insecure direct object reference attack?&lt;br /&gt;
&lt;br /&gt;
# Nonpersistent cookies &lt;br /&gt;
# Registry keys '''Correct'''&lt;br /&gt;
# Conditional constructs &lt;br /&gt;
# GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
37) Which of the following vulnerabilities is most likely to occur due to an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Executing commands on the server.&lt;br /&gt;
# Impersonating any user on the system.&lt;br /&gt;
# Modifying SQL data pointed to by the query.&lt;br /&gt;
# Accessing a resource without authorization. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
38) Which of the following is the best way to mitigate the threat of an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Use session-based indirection. '''Correct'''&lt;br /&gt;
# Use POST parameters instead of GET parameters. &lt;br /&gt;
# Use a regular expression.&lt;br /&gt;
# Send successful logins to a well-known location instead of automatic redirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
39) State whether the following statement is True or False.&lt;br /&gt;
Time of Check Time of Use (TOCTOU) occurs if the authorization check is performed on one page of a Web site and the resource is used on a different page.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
40) Your Web application stores information about many accounts. Which threat is your Web application susceptible to if you can manipulate the URL of an account page to access all accounts? &lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Injection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
41) Which of the following threats is most likely to be caused by poor input validation? &lt;br /&gt;
&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Insufficient transport layer protection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
42) Which threat is most likely to occur when a POST parameter performs an operation on behalf of a user without checking a shared secret?&lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery '''Correct'''&lt;br /&gt;
# Insecure direct object reference&lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Injection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
43) Which of the following is the most common result of a cross-site request forgery? &lt;br /&gt;
&lt;br /&gt;
# Elevation of privilege '''Correct''' &lt;br /&gt;
# Disabled security features&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Misconfigured security features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
44) An attacker lures a victim to malicious content on a Web site. A request is automatically sent to the vulnerable site which includes victim’s credentials. Which attack is most likely to occur in this scenario?&lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Insecure direct object reference&lt;br /&gt;
# Cross-site request forgery '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
45) State whether the following statement is True or False.&lt;br /&gt;
The downside of a nonce is that it needs to be stored on the client.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
46) What should you add to an HMAC to ensure that the secret value is unique for each request?&lt;br /&gt;
&lt;br /&gt;
# Salt &lt;br /&gt;
# Nonce &lt;br /&gt;
# Session ID &lt;br /&gt;
# Timestamp '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
47) Which of the following practices should you observe in order to implement defense-in-depth techniques against CSRF attacks?&lt;br /&gt;
&lt;br /&gt;
# Use GET parameters&lt;br /&gt;
# Use automatic redirection. &lt;br /&gt;
# Don’t include secrets in the URL. '''Correct'''&lt;br /&gt;
# Resubmit POST parameters during redirection.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
48) State whether the following statement is True or False.&lt;br /&gt;
HTTP GET parameters limit the types of manipulation a malicious user can perform on the victim to forge a request.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
49) Which of the following mistakes is most often associated with a security misconfiguration threat? &lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Failure to disable default accounts '''Correct'''&lt;br /&gt;
# Bad cryptography &lt;br /&gt;
# Unsafe key storage &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
50) You have not yet applied some recent service packs and updates to your Web application. Which of the following threats is your Web server susceptible to?&lt;br /&gt;
&lt;br /&gt;
# Injection &lt;br /&gt;
# Security misconfiguration '''Correct'''&lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
51) Which of the following is the best way to reevaluate your environment and address new threats? &lt;br /&gt;
&lt;br /&gt;
# Add or remove network segments. '''Correct'''&lt;br /&gt;
# Use the white-list validation of allowed input technique. &lt;br /&gt;
# Use custom cryptographic algorithms. &lt;br /&gt;
# Use your browser to forge unauthorized requests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
52) Which of the following procedures are involved in the hardening process? &lt;br /&gt;
&lt;br /&gt;
# Disable unnecessary features. '''Correct'''&lt;br /&gt;
# Resubmit POST parameters during redirection.&lt;br /&gt;
# Repeat the process at random intervals.&lt;br /&gt;
# Update the environment with changes only when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
53) Which of the following consequence is most likely to result if your production environment does not match your development, testing, and staging environments? &lt;br /&gt;
&lt;br /&gt;
# Your application may not work as expected. '''Correct'''&lt;br /&gt;
# Testing your application may take a long time. &lt;br /&gt;
# Your application may be expensive to administer.&lt;br /&gt;
# Your application may have too many configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
54) Which of the following can result in insecure cryptography?&lt;br /&gt;
&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# Unused services&lt;br /&gt;
# Default accounts &lt;br /&gt;
# Rotating keys frequently &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
55) Which of the following is most likely to result in insecure cryptography? &lt;br /&gt;
 &lt;br /&gt;
# Unused services&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# New products &lt;br /&gt;
# Missing patches&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
56) Which of the following may result in cryptographic weakness? &lt;br /&gt;
&lt;br /&gt;
# Failure to restrict URL access&lt;br /&gt;
# Insufficient cryptographic protocols '''Correct'''&lt;br /&gt;
# Missing patches&lt;br /&gt;
# Unnecessary/unused services or features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
57) Which of the following protocols is a network layer encryption protocol?&lt;br /&gt;
 &lt;br /&gt;
# HTTP &lt;br /&gt;
# EFS &lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
58) Which of the following factors helps you secure keys? &lt;br /&gt;
&lt;br /&gt;
# Complexity '''Correct'''&lt;br /&gt;
# Session-based indirection &lt;br /&gt;
# Escaping &lt;br /&gt;
# Encryption &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
59) Which of the following combines public-key cryptography with a cryptographic hash?&lt;br /&gt;
&lt;br /&gt;
# Nonce&lt;br /&gt;
# Digital signature '''Correct'''&lt;br /&gt;
# SSL&lt;br /&gt;
# Salt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
60) hich of the following depicts the typical impact of failure to restrict URL access?&lt;br /&gt;
&lt;br /&gt;
# Attackers perform man-in-the-middle attacks.&lt;br /&gt;
# Attackers impersonate any user on the system.&lt;br /&gt;
# Attackers invoke functions and services they have no authorization for. '''Correct'''&lt;br /&gt;
# Attackers perform all actions that the victims themselves have permission to perform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
61) Which of the following actions should you take to test the security of your Web application? &lt;br /&gt;
&lt;br /&gt;
# Use policy mechanisms. &lt;br /&gt;
# Use a simple and positive model at every layer. &lt;br /&gt;
# Set the secure flag on session ID cookies. &lt;br /&gt;
# Use your browser to forge unauthorized requests. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
62) Which of the following should you use to protect the connections between the physical tiers of your application? &lt;br /&gt;
&lt;br /&gt;
# EFS &lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# HTTP &lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
63) Which of the following is the best way to implement transport layer protection?&lt;br /&gt;
&lt;br /&gt;
# Install IDS&lt;br /&gt;
# Enable SSL '''Correct'''&lt;br /&gt;
# Set the HttpOnly flag on session ID cookies &lt;br /&gt;
# Perform client-side validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
64) Which of the following is most likely to result from unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Brute force attack &lt;br /&gt;
# Network sniffing &lt;br /&gt;
# Man-in-the-middle attack &lt;br /&gt;
# Bypassed authorization checks '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
65) Which of the following is the best way to protect a Web application from unvalidated redirects and forwards? &lt;br /&gt;
&lt;br /&gt;
# Validate the referrer header. '''Correct'''&lt;br /&gt;
# Use extended validation certificates. &lt;br /&gt;
# Use the escaping technique. &lt;br /&gt;
# Disallow requests to unauthorized file types. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
66) Which of the following is the best way to detect unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Use internal transfers without authorizing the user for target URL &lt;br /&gt;
# Use your browser to forge unauthorized requests&lt;br /&gt;
# Use weblogs to identify redirects and forwards '''Correct'''&lt;br /&gt;
# Use policy mechanisms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
67) State whether the following statement is True or False. &lt;br /&gt;
Most security issues are related to input and a user’s ability to interact with and control input.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
68) State whether the following statement is True or False.&lt;br /&gt;
If user input can be confused for instructions in the language or the way the language is applied, then the language is vulnerable to an injection attack.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
69) In which of the following scenarios should you use the escaping technique? &lt;br /&gt;
&lt;br /&gt;
# When user input is echoed back to the user in HTML '''Correct'''&lt;br /&gt;
# When you need to validate any input as valid input &lt;br /&gt;
# When you are trying to protect against regular expression injection &lt;br /&gt;
# When you need to tell the interpreter that input is code&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
70) Which of the following is the best way to prevent unvalidated redirect and forwards vulnerabilities?&lt;br /&gt;
&lt;br /&gt;
# Use an allow list, such as table indirection. '''Correct'''&lt;br /&gt;
# Use client-side validation. &lt;br /&gt;
# Allow only absolute redirects. &lt;br /&gt;
# Use session-based indirection.&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=115070</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Single Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=115070"/>
				<updated>2011-08-04T17:33:22Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last updated 4 Aug 11&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions - Single Select'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Which of the following consequences is most likely to occur due to an injection attack? &lt;br /&gt;
&lt;br /&gt;
# Spoofing &lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application?&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) Which of the following scenarios is most likely to cause an injection attack?&lt;br /&gt;
&lt;br /&gt;
# Unvalidated input is embedded in an instruction stream. '''Correct'''&lt;br /&gt;
# Unvalidated input can be distinguished from valid instructions. &lt;br /&gt;
# A Web application does not validate a client’s access to a resource. &lt;br /&gt;
# A Web action performs an operation on behalf of the user without checking a shared secret. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4) A user is able to pass malicious input that invokes control codes in your Web application. Which vulnerability is most likely to occur in your Web application?&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5) Which of the following is the best way to protect against injection attacks?&lt;br /&gt;
&lt;br /&gt;
# SQL queries based on user input&lt;br /&gt;
# Input validation using an allow list '''Correct'''&lt;br /&gt;
# Memory size checks&lt;br /&gt;
# Validate integer values before referencing arrays&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6) Which of the following is most vulnerable to injection attacks?&lt;br /&gt;
&lt;br /&gt;
# Session IDs&lt;br /&gt;
# Registry keys &lt;br /&gt;
# Regular expressions '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
7) Which character is most likely to be used for an SQL injection attack? &lt;br /&gt;
&lt;br /&gt;
# Single quote (') '''Correct'''&lt;br /&gt;
# Null (\0) byte&lt;br /&gt;
# Less than sign(&amp;lt;)&lt;br /&gt;
# Greater than sign(&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8) Which mitigation technique can help you strictly define valid input?&lt;br /&gt;
&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Memory size checks &lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9) Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Table indirection '''Correct'''&lt;br /&gt;
# Escaping &lt;br /&gt;
# Memory size checks &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
10) Which mitigation technique helps you tell the parser that a specific character is a literal and not a control character? &lt;br /&gt;
&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Allow list &lt;br /&gt;
# Escaping '''Correct'''&lt;br /&gt;
# Block list &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11) State whether the following statement is True or False.&lt;br /&gt;
You should use a blacklist wherever possible; use whitelists only as a secondary defense. &lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
12) Which of the following is the best way to define disallowed inputs? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
13) Which of the following are injection attacks?&lt;br /&gt;
&lt;br /&gt;
# Cross-site scripting '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Broken authentication and session management&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following languages are the primary targets of cross-site scripting? &lt;br /&gt;
&lt;br /&gt;
# HTML '''Correct'''&lt;br /&gt;
# SQL &lt;br /&gt;
# XSLT&lt;br /&gt;
# XPath &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?&lt;br /&gt;
&lt;br /&gt;
# Reflected XSS '''Correct''' &lt;br /&gt;
# Persistent XSS &lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
# Failure to restrict URL access&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to prevent a DOM-based XSS attack? &lt;br /&gt;
&lt;br /&gt;
# Set the HttpOnly flag in cookies &lt;br /&gt;
# Ensure that session IDs are not exposed in a URL &lt;br /&gt;
# Ensure that a different nonce is created for each request &lt;br /&gt;
# Validate any input that comes from another Web site '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How does malicious input flow in a DOM-based XSS? &lt;br /&gt;
&lt;br /&gt;
# From server to client&lt;br /&gt;
# From client to itself '''Correct'''&lt;br /&gt;
# From attacker to server &lt;br /&gt;
# From victim to server &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to prevent malicious input exploiting your application?&lt;br /&gt;
&lt;br /&gt;
# Input validation using an allow List '''Correct'''&lt;br /&gt;
# Using encryption &lt;br /&gt;
# Using table indirection&lt;br /&gt;
# Using GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You should set the HttpOnly flag in a cookie to ensure that:&lt;br /&gt;
&lt;br /&gt;
# The cookie is not available to client scripts. '''Correct'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser.&lt;br /&gt;
# The cookie is sent over an encrypted channel. &lt;br /&gt;
# The cookie is a persistent cookie.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You should set a secure flag in a cookie to ensure that:&lt;br /&gt;
&lt;br /&gt;
# The cookie is a persistent cookie.&lt;br /&gt;
# The cookie is not available to client script. &lt;br /&gt;
# The cookie is sent over an encrypted channel. '''Correct'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
An attacker submits data to the server and the data is stored on the server. Which type of vulnerability is most likely to occur in your application? &lt;br /&gt;
&lt;br /&gt;
# DOM-based XSS &lt;br /&gt;
# Reflected XSS &lt;br /&gt;
# Persistent XSS '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following input sources can be directly controlled by a malicious user? &lt;br /&gt;
&lt;br /&gt;
# GET/POST parameters '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
# Ports &lt;br /&gt;
# Server code&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios is most likely to result in broken authentication and session management vulnerabilities? &lt;br /&gt;
&lt;br /&gt;
# Poorly implemented custom code is used. '''Correct'''&lt;br /&gt;
# Session-based indirection is used.&lt;br /&gt;
# Unused and unnecessary services, code, and DLLs are disabled. &lt;br /&gt;
# The HttpOnly flag is set in cookies. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take before implementing a custom authentication and session management system? &lt;br /&gt;
&lt;br /&gt;
# Find out if the HttpOnly flag is set in cookies.&lt;br /&gt;
# Find out if you can use a small extension to an existing component to implement the system. '''Correct'''&lt;br /&gt;
# Find out if form variables are available to store data. &lt;br /&gt;
# Find out if you need to use session-based indirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
When implementing an authentication or session system, you should ensure that new session IDs are not created at login.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following functionalities should you include in an authentication and session management system? &lt;br /&gt;
&lt;br /&gt;
# Logout functionality '''Correct'''&lt;br /&gt;
# Regular expressions&lt;br /&gt;
# Escaping functionality&lt;br /&gt;
# Forwarding system functionality&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Why should you use CAPTCHA? &lt;br /&gt;
&lt;br /&gt;
# To create cryptographically random session IDs &lt;br /&gt;
# To protect credentials by using encryption or cryptographic salt and hash &lt;br /&gt;
# To protect authentication systems from automated or brute-force attacks '''Correct'''&lt;br /&gt;
# To ensure that authentication systems implement inactivity timeout functionality &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you do before passing credentials over the network? &lt;br /&gt;
&lt;br /&gt;
# Replace the credentials with a cryptographic salt and hash. '''Correct'''&lt;br /&gt;
# Accept session IDs from URLs. &lt;br /&gt;
# Share the credentials with the client. &lt;br /&gt;
# Use persistent cookies to manage session IDs. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which location should you ideally use to store a session ID?&lt;br /&gt;
&lt;br /&gt;
# URLs &lt;br /&gt;
# Form variables&lt;br /&gt;
# Persistent cookies &lt;br /&gt;
# Non-persistent cookies '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to ensure that JavaScript cannot be used to access a cookie?&lt;br /&gt;
&lt;br /&gt;
# Set the secure flag in the cookie &lt;br /&gt;
# Set the HttpOnly flag in the cookie '''Correct'''&lt;br /&gt;
# Use the CAPTCHA system&lt;br /&gt;
# Use non-persistent cookies &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is an authentication system mandatory requirement? &lt;br /&gt;
&lt;br /&gt;
# Form variables are used for managing session IDs.&lt;br /&gt;
# Use a GOTCHA to prevent automated attacks.&lt;br /&gt;
# User logout and session inactivity controls. '''Correct'''&lt;br /&gt;
# Session IDs are only accepted from cookies and parameter variables.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? &lt;br /&gt;
&lt;br /&gt;
# It should identify returning users to the site. &lt;br /&gt;
# It should be public information.&lt;br /&gt;
# It should always use a persistent cookie. &lt;br /&gt;
# It should always use a non-persistent cookie. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
An identification token is a replacement for a user’s credentials and should allow access to restricted resources of a Web site.&lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following tasks is performed by a session-based system? &lt;br /&gt;
&lt;br /&gt;
# Identifying returning users '''Correct'''&lt;br /&gt;
# Using form variables for managing session IDs &lt;br /&gt;
# Using the HTTP protocol &lt;br /&gt;
# Sending successful logins to a well-known location &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat is most likely to occur when a Web application fails to validate a client's access to a resource?&lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following objects is most susceptible to an insecure direct object reference attack?&lt;br /&gt;
&lt;br /&gt;
# Nonpersistent cookies &lt;br /&gt;
# Registry keys '''Correct'''&lt;br /&gt;
# Conditional constructs &lt;br /&gt;
# GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following vulnerabilities is most likely to occur due to an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Executing commands on the server.&lt;br /&gt;
# Impersonating any user on the system.&lt;br /&gt;
# Modifying SQL data pointed to by the query.&lt;br /&gt;
# Accessing a resource without authorization. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to mitigate the threat of an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Use session-based indirection. '''Correct'''&lt;br /&gt;
# Use POST parameters instead of GET parameters. &lt;br /&gt;
# Use a regular expression.&lt;br /&gt;
# Send successful logins to a well-known location instead of automatic redirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
Time of Check Time of Use (TOCTOU) occurs if the authorization check is performed on one page of a Web site and the resource is used on a different page.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Your Web application stores information about many accounts. Which threat is your Web application susceptible to if you can manipulate the URL of an account page to access all accounts? &lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Injection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following threats is most likely to be caused by poor input validation? &lt;br /&gt;
&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Insufficient transport layer protection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat is most likely to occur when a POST parameter performs an operation on behalf of a user without checking a shared secret?&lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery '''Correct'''&lt;br /&gt;
# Insecure direct object reference&lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Injection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the most common result of a cross-site request forgery? &lt;br /&gt;
&lt;br /&gt;
# Elevation of privilege '''Correct''' &lt;br /&gt;
# Disabled security features&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Misconfigured security features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
An attacker lures a victim to malicious content on a Web site. A request is automatically sent to the vulnerable site which includes victim’s credentials. Which attack is most likely to occur in this scenario?&lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Insecure direct object reference&lt;br /&gt;
# Cross-site request forgery '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
The downside of a nonce is that it needs to be stored on the client.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you add to an HMAC to ensure that the secret value is unique for each request?&lt;br /&gt;
&lt;br /&gt;
# Salt &lt;br /&gt;
# Nonce &lt;br /&gt;
# Session ID &lt;br /&gt;
# Timestamp '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following practices should you observe in order to implement defense-in-depth techniques against CSRF attacks?&lt;br /&gt;
&lt;br /&gt;
# Use GET parameters&lt;br /&gt;
# Use automatic redirection. &lt;br /&gt;
# Don’t include secrets in the URL. '''Correct'''&lt;br /&gt;
# Resubmit POST parameters during redirection.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
HTTP GET parameters limit the types of manipulation a malicious user can perform on the victim to forge a request.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following mistakes is most often associated with a security misconfiguration threat? &lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Failure to disable default accounts '''Correct'''&lt;br /&gt;
# Bad cryptography &lt;br /&gt;
# Unsafe key storage &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You have not yet applied some recent service packs and updates to your Web application. Which of the following threats is your Web server susceptible to?&lt;br /&gt;
&lt;br /&gt;
# Injection &lt;br /&gt;
# Security misconfiguration '''Correct'''&lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to reevaluate your environment and address new threats? &lt;br /&gt;
&lt;br /&gt;
# Add or remove network segments. '''Correct'''&lt;br /&gt;
# Use the white-list validation of allowed input technique. &lt;br /&gt;
# Use custom cryptographic algorithms. &lt;br /&gt;
# Use your browser to forge unauthorized requests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following procedures are involved in the hardening process? &lt;br /&gt;
&lt;br /&gt;
# Disable unnecessary features. '''Correct'''&lt;br /&gt;
# Resubmit POST parameters during redirection.&lt;br /&gt;
# Repeat the process at random intervals.&lt;br /&gt;
# Update the environment with changes only when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequence is most likely to result if your production environment does not match your development, testing, and staging environments? &lt;br /&gt;
&lt;br /&gt;
# Your application may not work as expected. '''Correct'''&lt;br /&gt;
# Testing your application may take a long time. &lt;br /&gt;
# Your application may be expensive to administer.&lt;br /&gt;
# Your application may have too many configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following can result in insecure cryptography?&lt;br /&gt;
&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# Unused services&lt;br /&gt;
# Default accounts &lt;br /&gt;
# Rotating keys frequently &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is most likely to result in insecure cryptography? &lt;br /&gt;
 &lt;br /&gt;
# Unused services&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# New products &lt;br /&gt;
# Missing patches&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following may result in cryptographic weakness? &lt;br /&gt;
&lt;br /&gt;
# Failure to restrict URL access&lt;br /&gt;
# Insufficient cryptographic protocols '''Correct'''&lt;br /&gt;
# Missing patches&lt;br /&gt;
# Unnecessary/unused services or features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following protocols is a network layer encryption protocol?&lt;br /&gt;
 &lt;br /&gt;
# HTTP &lt;br /&gt;
# EFS &lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following factors helps you secure keys? &lt;br /&gt;
&lt;br /&gt;
# Complexity '''Correct'''&lt;br /&gt;
# Session-based indirection &lt;br /&gt;
# Escaping &lt;br /&gt;
# Encryption &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following combines public-key cryptography with a cryptographic hash?&lt;br /&gt;
&lt;br /&gt;
# Nonce&lt;br /&gt;
# Digital signature '''Correct'''&lt;br /&gt;
# SSL&lt;br /&gt;
# Salt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following depicts the typical impact of failure to restrict URL access?&lt;br /&gt;
&lt;br /&gt;
# Attackers perform man-in-the-middle attacks.&lt;br /&gt;
# Attackers impersonate any user on the system.&lt;br /&gt;
# Attackers invoke functions and services they have no authorization for. '''Correct'''&lt;br /&gt;
# Attackers perform all actions that the victims themselves have permission to perform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to test the security of your Web application? &lt;br /&gt;
&lt;br /&gt;
# Use policy mechanisms. &lt;br /&gt;
# Use a simple and positive model at every layer. &lt;br /&gt;
# Set the secure flag on session ID cookies. &lt;br /&gt;
# Use your browser to forge unauthorized requests. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following should you use to protect the connections between the physical tiers of your application? &lt;br /&gt;
&lt;br /&gt;
# EFS &lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# HTTP &lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to implement transport layer protection?&lt;br /&gt;
&lt;br /&gt;
# Install IDS&lt;br /&gt;
# Enable SSL '''Correct'''&lt;br /&gt;
# Set the HttpOnly flag on session ID cookies &lt;br /&gt;
# Perform client-side validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is most likely to result from unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Brute force attack &lt;br /&gt;
# Network sniffing &lt;br /&gt;
# Man-in-the-middle attack &lt;br /&gt;
# Bypassed authorization checks '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to protect a Web application from unvalidated redirects and forwards? &lt;br /&gt;
&lt;br /&gt;
# Validate the referrer header. '''Correct'''&lt;br /&gt;
# Use extended validation certificates. &lt;br /&gt;
# Use the escaping technique. &lt;br /&gt;
# Disallow requests to unauthorized file types. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to detect unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Use internal transfers without authorizing the user for target URL &lt;br /&gt;
# Use your browser to forge unauthorized requests&lt;br /&gt;
# Use weblogs to identify redirects and forwards '''Correct'''&lt;br /&gt;
# Use policy mechanisms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False. &lt;br /&gt;
Most security issues are related to input and a user’s ability to interact with and control input.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
If user input can be confused for instructions in the language or the way the language is applied, then the language is vulnerable to an injection attack.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In which of the following scenarios should you use the escaping technique? &lt;br /&gt;
&lt;br /&gt;
# When user input is echoed back to the user in HTML '''Correct'''&lt;br /&gt;
# When you need to validate any input as valid input &lt;br /&gt;
# When you are trying to protect against regular expression injection &lt;br /&gt;
# When you need to tell the interpreter that input is code&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Which of the following is the best way to prevent unvalidated redirect and forwards vulnerabilities?&lt;br /&gt;
&lt;br /&gt;
# Use an allow list, such as table indirection. '''Correct'''&lt;br /&gt;
# Use client-side validation. &lt;br /&gt;
# Allow only absolute redirects. &lt;br /&gt;
# Use session-based indirection.&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=115067</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Multiple Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=115067"/>
				<updated>2011-08-04T16:56:39Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last updated 4 Aug 11&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions - Multiple Select'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequences are most likely to occur due to  an injection attack? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Spoofing &lt;br /&gt;
# Data loss '''Correct'''&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios are most likely to cause an injection attack? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Unvalidated input is embedded in an instruction stream. '''Correct'''&lt;br /&gt;
# Unvalidated input cannot be distinguished from valid instructions. '''Correct'''&lt;br /&gt;
# A Web application does not validate a client’s access to a resource. &lt;br /&gt;
# A Web action performs an operation on behalf of the user without checking a shared secret. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to protect against injection attacks? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Escaping '''Correct'''&lt;br /&gt;
# Memory size checks&lt;br /&gt;
# Validate integer values before referencing arrays&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are most vulnerable to injection attacks? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Session IDs&lt;br /&gt;
# Registry keys &lt;br /&gt;
# Regular expressions '''Correct'''&lt;br /&gt;
# SQL queries based on user input '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which mitigation techniques when used in combination can help you strictly define valid input? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Table indirection '''Correct'''&lt;br /&gt;
# Escaping &lt;br /&gt;
# Object class for user input '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following languages are the primary targets of cross-site scripting? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# HTML '''Correct'''&lt;br /&gt;
# SQL &lt;br /&gt;
# XSLT&lt;br /&gt;
# JavaScript '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to prevent malicious input exploiting your application? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Using allow List '''Correct'''&lt;br /&gt;
# Using block list '''Correct'''&lt;br /&gt;
# Using escaping '''Correct'''&lt;br /&gt;
# Using encryption &lt;br /&gt;
# Using table indirection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following input sources can be directly controlled by a malicious user? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Window.location '''Correct'''&lt;br /&gt;
# GET/POST parameters '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
# Ports and network resources &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios are most likely to result in broken authentication and session management vulnerabilities? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Poorly implemented custom code is used. '''Correct'''&lt;br /&gt;
# Misconfigured off-the-shelf code is used. '''Correct'''&lt;br /&gt;
# Unused and unnecessary services, code, and DLLs are disabled. &lt;br /&gt;
# The HttpOnly flag is set in cookies. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take before implementing a custom authentication and session management system? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Find out if a suitable framework component already exists. '''Correct'''&lt;br /&gt;
# Find out if you can use a small extension to an existing component to implement the system. '''Correct'''&lt;br /&gt;
# Find out if form variables are available to store data. &lt;br /&gt;
# Find out if you need to use session-based indirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following functionalities should you include in an authentication and session management system? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Logout functionality '''Correct'''&lt;br /&gt;
# Inactivity timeout functionality '''Correct'''&lt;br /&gt;
# Escaping functionality&lt;br /&gt;
# Forwarding system functionality&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are authentication system mandatory requirements? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Strong passwords are required. '''Correct'''&lt;br /&gt;
# Use a GOTCHA to prevent automated attacks.&lt;br /&gt;
# User logout and session inactivity are required. '''Correct'''&lt;br /&gt;
# Session IDs are only accepted from cookies and parameter variables.&lt;br /&gt;
# Credentials are always protected with encryption or cryptographic salting and hashing. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# It should identify returning users to the site. &lt;br /&gt;
# It should be used as a replacement for a user's credentials. '''Correct'''&lt;br /&gt;
# It should always use a persistent cookie. &lt;br /&gt;
# It should always use a non-persistent cookie. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following tasks are performed by a session-based system? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Identifying returning users '''Correct'''&lt;br /&gt;
# Providing access to restricted resources '''Correct'''&lt;br /&gt;
# Using the HTTP protocol &lt;br /&gt;
# Sending successful logins to a well-known location &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following objects are most susceptible to an insecure direct object reference attack? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Files '''Correct'''&lt;br /&gt;
# Registry keys '''Correct'''&lt;br /&gt;
# Conditional constructs &lt;br /&gt;
# GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following vulnerabilities are most likely to occur due to an insecure direct object reference attack? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Executing commands on the server.&lt;br /&gt;
# Impersonating any user on the system.&lt;br /&gt;
# Modifying SQL data pointed to by the query.&lt;br /&gt;
# Modifying data without authorization. '''Correct'''&lt;br /&gt;
# Accessing a resource without authorization. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to mitigate the threat of an insecure direct object reference attack? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Use session-based indirection. '''Correct'''&lt;br /&gt;
# Use POST parameters instead of GET parameters. &lt;br /&gt;
# Perform an access check each time a resource identifier arrives as input. '''Correct'''&lt;br /&gt;
# Send successful logins to a well-known location instead of automatic redirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following threats are most likely to be caused by poor input validation? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Cross-site scripting '''Correct'''&lt;br /&gt;
# Insecure direct object reference '''Correct''' &lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Insufficient transport layer protection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the most common results of a cross-site request forgery? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Elevation of privilege '''Correct'''&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Spoofing and tampering '''Correct'''&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Misconfigured or disabled security features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are most often associated with a security misconfiguration threat? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Unused services '''Correct'''&lt;br /&gt;
# Default accounts '''Correct'''&lt;br /&gt;
# Bad cryptography &lt;br /&gt;
# Unsafe key storage &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to reevaluate your environment and address new threats? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Add or remove network segments. '''Correct'''&lt;br /&gt;
# Apply the latest service packs, patches, hotfixes, and updates. '''Correct'''&lt;br /&gt;
# Use custom cryptographic algorithms. &lt;br /&gt;
# Use your browser to forge unauthorized requests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following procedures are involved in the hardening process? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Disable unnecessary features. '''Correct'''&lt;br /&gt;
# Review all settings/configurations. '''Correct'''&lt;br /&gt;
# Repeat the process at random intervals.&lt;br /&gt;
# Update the environment with changes only when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequences are most likely to result if your production environment does not match your development, testing, and staging environments? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Your application may not work as expected. '''Correct'''&lt;br /&gt;
# Your application may not authenticate users as expected. '''Correct''' &lt;br /&gt;
# Your application may be expensive to administer.&lt;br /&gt;
# Your application may have too many configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following can result in insecure cryptography? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# Unused services&lt;br /&gt;
# Default accounts &lt;br /&gt;
# Failure to rotate keys '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are most likely to result in insecure cryptography? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Custom cryptographic algorithms '''Correct'''&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# New products &lt;br /&gt;
# Missing patches&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following may result in cryptographic weakness? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Poor/weak algorithm choice '''Correct'''&lt;br /&gt;
# Custom cryptographic algorithms '''Correct'''&lt;br /&gt;
# Insufficient cryptographic protocols '''Correct'''&lt;br /&gt;
# Missing patches&lt;br /&gt;
# Unnecessary/unused services or features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following protocols are network layer encryption protocols? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# EFS &lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following factors help you secure keys? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Complexity '''Correct'''&lt;br /&gt;
# Rotation '''Correct'''&lt;br /&gt;
# Randomness '''Correct'''&lt;br /&gt;
# Encryption &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following depict the typical impact of failure to restrict URL access? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Attackers access other users’ accounts and data. '''Correct'''&lt;br /&gt;
# Attackers impersonate any user on the system.&lt;br /&gt;
# Attackers invoke functions and services they have no authorization for. '''Correct'''&lt;br /&gt;
# Attackers perform all actions that the victims themselves have permission to perform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to verify the implementation of your Web application? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Use policy mechanisms. &lt;br /&gt;
# Use a simple and positive model at every layer. &lt;br /&gt;
# Verify that each URL in your application is appropriately protected. '''Correct'''&lt;br /&gt;
# Use your browser to forge unauthorized requests. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following should you use to protect the connections between the physical tiers of your application? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# EFS &lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to implement transport layer protection? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Install IDS&lt;br /&gt;
# Enable SSL '''Correct'''&lt;br /&gt;
# Set the HttpOnly flag on session ID cookies &lt;br /&gt;
# Enable IPSec '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to protect a Web application from unvalidated redirects and forwards? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Validate the referrer header '''Correct'''&lt;br /&gt;
# Use extended validation certificates &lt;br /&gt;
# Validate all input from the client '''Correct'''&lt;br /&gt;
# Disallow requests to unauthorized file types &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In which of the following scenarios should you use the escaping technique? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# When user input is echoed back to the user in HTML '''Correct'''&lt;br /&gt;
# When you need to validate any input as valid input &lt;br /&gt;
# When you are trying to protect against regular expression injection &lt;br /&gt;
# When you need to tell the interpreter that input is data and not code '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to prevent unvalidated redirect and forwards vulnerabilities? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Use an allow list, such as table indirection. '''Correct'''&lt;br /&gt;
# Use client-side validation. &lt;br /&gt;
# Allow only relative redirects. '''Correct'''&lt;br /&gt;
# Use session-based indirection.&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=115066</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Single Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=115066"/>
				<updated>2011-08-04T16:56:09Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last updated 4 Aug 11&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions - Single Select'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequences is most likely to occur due to an injection attack? &lt;br /&gt;
&lt;br /&gt;
# Spoofing &lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application?&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios is most likely to cause an injection attack?&lt;br /&gt;
&lt;br /&gt;
# Unvalidated input is embedded in an instruction stream. '''Correct'''&lt;br /&gt;
# Unvalidated input can be distinguished from valid instructions. &lt;br /&gt;
# A Web application does not validate a client’s access to a resource. &lt;br /&gt;
# A Web action performs an operation on behalf of the user without checking a shared secret. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A user is able to pass malicious input that invokes control codes in your Web application. Which vulnerability is most likely to occur in your Web application?&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to protect against injection attacks?&lt;br /&gt;
&lt;br /&gt;
# SQL queries based on user input&lt;br /&gt;
# Input validation using an allow list '''Correct'''&lt;br /&gt;
# Memory size checks&lt;br /&gt;
# Validate integer values before referencing arrays&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is most vulnerable to injection attacks?&lt;br /&gt;
&lt;br /&gt;
# Session IDs&lt;br /&gt;
# Registry keys &lt;br /&gt;
# Regular expressions '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which character is most likely to be used for an SQL injection attack? &lt;br /&gt;
&lt;br /&gt;
# Single quote (') '''Correct'''&lt;br /&gt;
# Null (\0) byte&lt;br /&gt;
# Less than sign(&amp;lt;)&lt;br /&gt;
# Greater than sign(&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which mitigation technique can help you strictly define valid input?&lt;br /&gt;
&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Memory size checks &lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Table indirection '''Correct'''&lt;br /&gt;
# Escaping &lt;br /&gt;
# Memory size checks &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which mitigation technique helps you tell the parser that a specific character is a literal and not a control character? &lt;br /&gt;
&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Allow list &lt;br /&gt;
# Escaping '''Correct'''&lt;br /&gt;
# Block list &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
You should use a blacklist wherever possible; use whitelists only as a secondary defense. &lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to define disallowed inputs? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are injection attacks?&lt;br /&gt;
&lt;br /&gt;
# Cross-site scripting '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Broken authentication and session management&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following languages are the primary targets of cross-site scripting? &lt;br /&gt;
&lt;br /&gt;
# HTML '''Correct'''&lt;br /&gt;
# SQL &lt;br /&gt;
# XSLT&lt;br /&gt;
# XPath &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?&lt;br /&gt;
&lt;br /&gt;
# Reflected XSS '''Correct''' &lt;br /&gt;
# Persistent XSS &lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
# Failure to restrict URL access&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to prevent a DOM-based XSS attack? &lt;br /&gt;
&lt;br /&gt;
# Set the HttpOnly flag in cookies &lt;br /&gt;
# Ensure that session IDs are not exposed in a URL &lt;br /&gt;
# Ensure that a different nonce is created for each request &lt;br /&gt;
# Validate any input that comes from another Web site '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How does malicious input flow in a DOM-based XSS? &lt;br /&gt;
&lt;br /&gt;
# From server to client&lt;br /&gt;
# From client to itself '''Correct'''&lt;br /&gt;
# From attacker to server &lt;br /&gt;
# From victim to server &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to prevent malicious input exploiting your application?&lt;br /&gt;
&lt;br /&gt;
# Input validation using an allow List '''Correct'''&lt;br /&gt;
# Using encryption &lt;br /&gt;
# Using table indirection&lt;br /&gt;
# Using GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You should set the HttpOnly flag in a cookie to ensure that:&lt;br /&gt;
&lt;br /&gt;
# The cookie is not available to client scripts. '''Correct'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser.&lt;br /&gt;
# The cookie is sent over an encrypted channel. &lt;br /&gt;
# The cookie is a persistent cookie.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You should set a secure flag in a cookie to ensure that:&lt;br /&gt;
&lt;br /&gt;
# The cookie is a persistent cookie.&lt;br /&gt;
# The cookie is not available to client script. &lt;br /&gt;
# The cookie is sent over an encrypted channel. '''Correct'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
An attacker submits data to the server and the data is stored on the server. Which type of vulnerability is most likely to occur in your application? &lt;br /&gt;
&lt;br /&gt;
# DOM-based XSS &lt;br /&gt;
# Reflected XSS &lt;br /&gt;
# Persistent XSS '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following input sources can be directly controlled by a malicious user? &lt;br /&gt;
&lt;br /&gt;
# GET/POST parameters '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
# Ports &lt;br /&gt;
# Server code&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios is most likely to result in broken authentication and session management vulnerabilities? &lt;br /&gt;
&lt;br /&gt;
# Poorly implemented custom code is used. '''Correct'''&lt;br /&gt;
# Session-based indirection is used.&lt;br /&gt;
# Unused and unnecessary services, code, and DLLs are disabled. &lt;br /&gt;
# The HttpOnly flag is set in cookies. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take before implementing a custom authentication and session management system? &lt;br /&gt;
&lt;br /&gt;
# Find out if the HttpOnly flag is set in cookies.&lt;br /&gt;
# Find out if you can use a small extension to an existing component to implement the system. '''Correct'''&lt;br /&gt;
# Find out if form variables are available to store data. &lt;br /&gt;
# Find out if you need to use session-based indirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
When implementing an authentication or session system, you should ensure that new session IDs are not created at login.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following functionalities should you include in an authentication and session management system? &lt;br /&gt;
&lt;br /&gt;
# Logout functionality '''Correct'''&lt;br /&gt;
# Regular expressions&lt;br /&gt;
# Escaping functionality&lt;br /&gt;
# Forwarding system functionality&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Why should you use CAPTCHA? &lt;br /&gt;
&lt;br /&gt;
# To create cryptographically random session IDs &lt;br /&gt;
# To protect credentials by using encryption or cryptographic salt and hash &lt;br /&gt;
# To protect authentication systems from automated or brute-force attacks '''Correct'''&lt;br /&gt;
# To ensure that authentication systems implement inactivity timeout functionality &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you do before passing credentials over the network? &lt;br /&gt;
&lt;br /&gt;
# Replace the credentials with a cryptographic salt and hash. '''Correct'''&lt;br /&gt;
# Accept session IDs from URLs. &lt;br /&gt;
# Share the credentials with the client. &lt;br /&gt;
# Use persistent cookies to manage session IDs. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which location should you ideally use to store a session ID?&lt;br /&gt;
&lt;br /&gt;
# URLs &lt;br /&gt;
# Form variables&lt;br /&gt;
# Persistent cookies &lt;br /&gt;
# Non-persistent cookies '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to ensure that JavaScript cannot be used to access a cookie?&lt;br /&gt;
&lt;br /&gt;
# Set the secure flag in the cookie &lt;br /&gt;
# Set the HttpOnly flag in the cookie '''Correct'''&lt;br /&gt;
# Use the CAPTCHA system&lt;br /&gt;
# Use non-persistent cookies &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is an authentication system mandatory requirement? &lt;br /&gt;
&lt;br /&gt;
# Form variables are used for managing session IDs.&lt;br /&gt;
# Use a GOTCHA to prevent automated attacks.&lt;br /&gt;
# User logout and session inactivity controls. '''Correct'''&lt;br /&gt;
# Session IDs are only accepted from cookies and parameter variables.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? &lt;br /&gt;
&lt;br /&gt;
# It should identify returning users to the site. &lt;br /&gt;
# It should be public information.&lt;br /&gt;
# It should always use a persistent cookie. &lt;br /&gt;
# It should always use a non-persistent cookie. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
An identification token is a replacement for a user’s credentials and should allow access to restricted resources of a Web site.&lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following tasks is performed by a session-based system? &lt;br /&gt;
&lt;br /&gt;
# Identifying returning users '''Correct'''&lt;br /&gt;
# Using form variables for managing session IDs &lt;br /&gt;
# Using the HTTP protocol &lt;br /&gt;
# Sending successful logins to a well-known location &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat is most likely to occur when a Web application fails to validate a client's access to a resource?&lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following objects is most susceptible to an insecure direct object reference attack?&lt;br /&gt;
&lt;br /&gt;
# Nonpersistent cookies &lt;br /&gt;
# Registry keys '''Correct'''&lt;br /&gt;
# Conditional constructs &lt;br /&gt;
# GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following vulnerabilities is most likely to occur due to an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Executing commands on the server.&lt;br /&gt;
# Impersonating any user on the system.&lt;br /&gt;
# Modifying SQL data pointed to by the query.&lt;br /&gt;
# Accessing a resource without authorization. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to mitigate the threat of an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Use session-based indirection. '''Correct'''&lt;br /&gt;
# Use POST parameters instead of GET parameters. &lt;br /&gt;
# Use a regular expression.&lt;br /&gt;
# Send successful logins to a well-known location instead of automatic redirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
Time of Check Time of Use (TOCTOU) occurs if the authorization check is performed on one page of a Web site and the resource is used on a different page.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Your Web application stores information about many accounts. Which threat is your Web application susceptible to if you can manipulate the URL of an account page to access all accounts? &lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Injection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following threats is most likely to be caused by poor input validation? &lt;br /&gt;
&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Insufficient transport layer protection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat is most likely to occur when a POST parameter performs an operation on behalf of a user without checking a shared secret?&lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery '''Correct'''&lt;br /&gt;
# Insecure direct object reference&lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Injection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the most common result of a cross-site request forgery? &lt;br /&gt;
&lt;br /&gt;
# Elevation of privilege '''Correct''' &lt;br /&gt;
# Disabled security features&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Misconfigured security features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
An attacker lures a victim to malicious content on a Web site. A request is automatically sent to the vulnerable site which includes victim’s credentials. Which attack is most likely to occur in this scenario?&lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Insecure direct object reference&lt;br /&gt;
# Cross-site request forgery '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
The downside of a nonce is that it needs to be stored on the client.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you add to an HMAC to ensure that the secret value is unique for each request?&lt;br /&gt;
&lt;br /&gt;
# Salt &lt;br /&gt;
# Nonce &lt;br /&gt;
# Session ID &lt;br /&gt;
# Timestamp '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following practices should you observe in order to implement defense-in-depth techniques against CSRF attacks?&lt;br /&gt;
&lt;br /&gt;
# Use GET parameters&lt;br /&gt;
# Use automatic redirection. &lt;br /&gt;
# Don’t include secrets in the URL. '''Correct'''&lt;br /&gt;
# Resubmit POST parameters during redirection.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
HTTP GET parameters limit the types of manipulation a malicious user can perform on the victim to forge a request.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following mistakes is most often associated with a security misconfiguration threat? &lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Failure to disable default accounts '''Correct'''&lt;br /&gt;
# Bad cryptography &lt;br /&gt;
# Unsafe key storage &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You have not yet applied some recent service packs and updates to your Web application. Which of the following threats is your Web server susceptible to?&lt;br /&gt;
&lt;br /&gt;
# Injection &lt;br /&gt;
# Security misconfiguration '''Correct'''&lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to reevaluate your environment and address new threats? &lt;br /&gt;
&lt;br /&gt;
# Add or remove network segments. '''Correct'''&lt;br /&gt;
# Use the white-list validation of allowed input technique. &lt;br /&gt;
# Use custom cryptographic algorithms. &lt;br /&gt;
# Use your browser to forge unauthorized requests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following procedures are involved in the hardening process? &lt;br /&gt;
&lt;br /&gt;
# Disable unnecessary features. '''Correct'''&lt;br /&gt;
# Resubmit POST parameters during redirection.&lt;br /&gt;
# Repeat the process at random intervals.&lt;br /&gt;
# Update the environment with changes only when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequence is most likely to result if your production environment does not match your development, testing, and staging environments? &lt;br /&gt;
&lt;br /&gt;
# Your application may not work as expected. '''Correct'''&lt;br /&gt;
# Testing your application may take a long time. &lt;br /&gt;
# Your application may be expensive to administer.&lt;br /&gt;
# Your application may have too many configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following can result in insecure cryptography?&lt;br /&gt;
&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# Unused services&lt;br /&gt;
# Default accounts &lt;br /&gt;
# Rotating keys frequently &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is most likely to result in insecure cryptography? &lt;br /&gt;
 &lt;br /&gt;
# Unused services&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# New products &lt;br /&gt;
# Missing patches&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following may result in cryptographic weakness? &lt;br /&gt;
&lt;br /&gt;
# Failure to restrict URL access&lt;br /&gt;
# Insufficient cryptographic protocols '''Correct'''&lt;br /&gt;
# Missing patches&lt;br /&gt;
# Unnecessary/unused services or features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following protocols is a network layer encryption protocol?&lt;br /&gt;
 &lt;br /&gt;
# HTTP &lt;br /&gt;
# EFS &lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following factors helps you secure keys? &lt;br /&gt;
&lt;br /&gt;
# Complexity '''Correct'''&lt;br /&gt;
# Session-based indirection &lt;br /&gt;
# Escaping &lt;br /&gt;
# Encryption &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following combines public-key cryptography with a cryptographic hash?&lt;br /&gt;
&lt;br /&gt;
# Nonce&lt;br /&gt;
# Digital signature '''Correct'''&lt;br /&gt;
# SSL&lt;br /&gt;
# Salt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following depicts the typical impact of failure to restrict URL access?&lt;br /&gt;
&lt;br /&gt;
# Attackers perform man-in-the-middle attacks.&lt;br /&gt;
# Attackers impersonate any user on the system.&lt;br /&gt;
# Attackers invoke functions and services they have no authorization for. '''Correct'''&lt;br /&gt;
# Attackers perform all actions that the victims themselves have permission to perform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to test the security of your Web application? &lt;br /&gt;
&lt;br /&gt;
# Use policy mechanisms. &lt;br /&gt;
# Use a simple and positive model at every layer. &lt;br /&gt;
# Set the secure flag on session ID cookies. &lt;br /&gt;
# Use your browser to forge unauthorized requests. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following should you use to protect the connections between the physical tiers of your application? &lt;br /&gt;
&lt;br /&gt;
# EFS &lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# HTTP &lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to implement transport layer protection?&lt;br /&gt;
&lt;br /&gt;
# Install IDS&lt;br /&gt;
# Enable SSL '''Correct'''&lt;br /&gt;
# Set the HttpOnly flag on session ID cookies &lt;br /&gt;
# Perform client-side validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is most likely to result from unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Brute force attack &lt;br /&gt;
# Network sniffing &lt;br /&gt;
# Man-in-the-middle attack &lt;br /&gt;
# Bypassed authorization checks '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to protect a Web application from unvalidated redirects and forwards? &lt;br /&gt;
&lt;br /&gt;
# Validate the referrer header. '''Correct'''&lt;br /&gt;
# Use extended validation certificates. &lt;br /&gt;
# Use the escaping technique. &lt;br /&gt;
# Disallow requests to unauthorized file types. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to detect unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Use internal transfers without authorizing the user for target URL &lt;br /&gt;
# Use your browser to forge unauthorized requests&lt;br /&gt;
# Use weblogs to identify redirects and forwards '''Correct'''&lt;br /&gt;
# Use policy mechanisms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False. &lt;br /&gt;
Most security issues are related to input and a user’s ability to interact with and control input.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
If user input can be confused for instructions in the language or the way the language is applied, then the language is vulnerable to an injection attack.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In which of the following scenarios should you use the escaping technique? &lt;br /&gt;
&lt;br /&gt;
# When user input is echoed back to the user in HTML '''Correct'''&lt;br /&gt;
# When you need to validate any input as valid input &lt;br /&gt;
# When you are trying to protect against regular expression injection &lt;br /&gt;
# When you need to tell the interpreter that input is code&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Which of the following is the best way to prevent unvalidated redirect and forwards vulnerabilities?&lt;br /&gt;
&lt;br /&gt;
# Use an allow list, such as table indirection. '''Correct'''&lt;br /&gt;
# Use client-side validation. &lt;br /&gt;
# Allow only absolute redirects. &lt;br /&gt;
# Use session-based indirection.&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Exams_Project&amp;diff=115065</id>
		<title>OWASP Exams Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Exams_Project&amp;diff=115065"/>
				<updated>2011-08-04T16:54:50Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main ====&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The OWASP Exams project will establish the model by which the OWASP community can create and distribute CC-licensed exams for use by educators. The purpose of the exams is to improve the effectiveness of OWASP training through the use of exams as a means of measurement and student progress tracking. The project will include creation of a set of CC-licensed exams, a model for exam usage, and a roadmap for future exam creation.&lt;br /&gt;
The exams will be distributed in this project site as well as in Moodle (an open source LMS) format so that they can be re-purposed for use in any system or an educator can use them directly in Moodle to administer exams to students. Ideally the exams will be tied to OWASP Academies learning blocks so that there is good learning and training content that can be used to motivate the usage of the exams. This project will also include study aids for use in learning material covered by the exams.&lt;br /&gt;
&lt;br /&gt;
==Components==&lt;br /&gt;
&lt;br /&gt;
===Exams===&lt;br /&gt;
As exams are ready we will add them to this page for those who want a version of the exam outside of the Moodle LMS.&lt;br /&gt;
&lt;br /&gt;
The exams that are available in this project are:&lt;br /&gt;
* [[OWASP Top 10 Threats and Mitigations Exam - Single Select]]&lt;br /&gt;
* [[OWASP Top 10 Threats and Mitigations Exam - Multiple Select|Corresponding Multiple Select questions]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Moodle Learning Management System===&lt;br /&gt;
You can find the OWASP Academies Moodle learning management system (LMS) here - [http://www.owaspa.org/moodle http://www.owaspa.org/moodle]&lt;br /&gt;
&lt;br /&gt;
The Moodle learning management system will contain eLearning courses to teach OWASP related application security content related to the exams in this project. The LMS will also host exams from this project so that students can log into the system, take an exam and get a grade. Independent students can use this system and educators can also administer an exam for a class or multiple classes of students.&lt;br /&gt;
&lt;br /&gt;
The first deliverables of this project on the LMS are:&lt;br /&gt;
* [http://www.owaspa.org/moodle/ OWASP Top 10 Threats and Mitigations] eLearning [http://en.wikipedia.org/wiki/Sharable_Content_Object_Reference_Model SCORM] course. &lt;br /&gt;
* [http://www.owaspa.org/moodle/ OWASP Top 10 Threats and Mitigations] eLearning [http://en.wikipedia.org/wiki/Sharable_Content_Object_Reference_Model SCORM] exam. &lt;br /&gt;
&lt;br /&gt;
===TeamMentor Security Knowledge Base===&lt;br /&gt;
The TeamMentor security knowledge base is a collection of articles that students can use to learn application security concepts before or after taking an exam. This information can be used to brush up on concepts pre-exam or can be used as part of continuous education and during the application of application security concepts on the job. &lt;br /&gt;
&lt;br /&gt;
The TeamMentor knowledge base consists of the following components (click on the links for access to each):&lt;br /&gt;
* [http://owasp.securityinnovation.com TeamMentor OWASP Edition]. This is a web application that contains a browseable, searchable collection of free application security articles focused on OWASP concepts.&lt;br /&gt;
* [https://github.com/SecurityInnovation/OWASP-TeamMentor-Library TeamMentor OWASP Library Source]. This is a GitHub repository that contains all of the XML files that make up the OWASP library. You can download the library and make changes to it in order to meet your particular needs. If you make changes to the files in the library itself, be sure to retain library integrity by using the Guidance Explorer authoring tool and testing your library before checking any files into the source repository. We will periodically update the TeamMentor OWASP Edition instance with changes made by the community to the GitHub library.&lt;br /&gt;
* [http://guidanceexplorer.codeplex.com/ Guidance Explorer Authoring Tool]. This is a .NET application that you can use to edit library files or create new library articles. Please use this tool when making changes to the library so that you preserve library integrity.&lt;br /&gt;
&lt;br /&gt;
==== Project About ====&lt;br /&gt;
{{:Projects/OWASP Exams Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
==== Sponsor ====&lt;br /&gt;
[[Image:SILogoHoriz-300x49.jpg]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Exams Project]] [[Category:OWASP_Document]][[Category:OWASP_Alpha_Quality_Document|OWASP Alpha Quality Document]]&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=115061</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Multiple Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=115061"/>
				<updated>2011-08-04T16:49:57Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Under Construction'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions - Multiple Select'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequences are most likely to occur due to  an injection attack? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Spoofing &lt;br /&gt;
# Data loss '''Correct'''&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios are most likely to cause an injection attack? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Unvalidated input is embedded in an instruction stream. '''Correct'''&lt;br /&gt;
# Unvalidated input cannot be distinguished from valid instructions. '''Correct'''&lt;br /&gt;
# A Web application does not validate a client’s access to a resource. &lt;br /&gt;
# A Web action performs an operation on behalf of the user without checking a shared secret. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to protect against injection attacks? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Escaping '''Correct'''&lt;br /&gt;
# Memory size checks&lt;br /&gt;
# Validate integer values before referencing arrays&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are most vulnerable to injection attacks? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Session IDs&lt;br /&gt;
# Registry keys &lt;br /&gt;
# Regular expressions '''Correct'''&lt;br /&gt;
# SQL queries based on user input '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which mitigation techniques when used in combination can help you strictly define valid input? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Table indirection '''Correct'''&lt;br /&gt;
# Escaping &lt;br /&gt;
# Object class for user input '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following languages are the primary targets of cross-site scripting? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# HTML '''Correct'''&lt;br /&gt;
# SQL &lt;br /&gt;
# XSLT&lt;br /&gt;
# JavaScript '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to prevent malicious input exploiting your application? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Using allow List '''Correct'''&lt;br /&gt;
# Using block list '''Correct'''&lt;br /&gt;
# Using escaping '''Correct'''&lt;br /&gt;
# Using encryption &lt;br /&gt;
# Using table indirection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following input sources can be directly controlled by a malicious user? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Window.location '''Correct'''&lt;br /&gt;
# GET/POST parameters '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
# Ports and network resources &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios are most likely to result in broken authentication and session management vulnerabilities? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Poorly implemented custom code is used. '''Correct'''&lt;br /&gt;
# Misconfigured off-the-shelf code is used. '''Correct'''&lt;br /&gt;
# Unused and unnecessary services, code, and DLLs are disabled. &lt;br /&gt;
# The HttpOnly flag is set in cookies. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take before implementing a custom authentication and session management system? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Find out if a suitable framework component already exists. '''Correct'''&lt;br /&gt;
# Find out if you can use a small extension to an existing component to implement the system. '''Correct'''&lt;br /&gt;
# Find out if form variables are available to store data. &lt;br /&gt;
# Find out if you need to use session-based indirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following functionalities should you include in an authentication and session management system? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Logout functionality '''Correct'''&lt;br /&gt;
# Inactivity timeout functionality '''Correct'''&lt;br /&gt;
# Escaping functionality&lt;br /&gt;
# Forwarding system functionality&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are authentication system mandatory requirements? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Strong passwords are required. '''Correct'''&lt;br /&gt;
# Use a GOTCHA to prevent automated attacks.&lt;br /&gt;
# User logout and session inactivity are required. '''Correct'''&lt;br /&gt;
# Session IDs are only accepted from cookies and parameter variables.&lt;br /&gt;
# Credentials are always protected with encryption or cryptographic salting and hashing. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# It should identify returning users to the site. &lt;br /&gt;
# It should be used as a replacement for a user's credentials. '''Correct'''&lt;br /&gt;
# It should always use a persistent cookie. &lt;br /&gt;
# It should always use a non-persistent cookie. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following tasks are performed by a session-based system? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Identifying returning users '''Correct'''&lt;br /&gt;
# Providing access to restricted resources '''Correct'''&lt;br /&gt;
# Using the HTTP protocol &lt;br /&gt;
# Sending successful logins to a well-known location &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following objects are most susceptible to an insecure direct object reference attack? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Files '''Correct'''&lt;br /&gt;
# Registry keys '''Correct'''&lt;br /&gt;
# Conditional constructs &lt;br /&gt;
# GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following vulnerabilities are most likely to occur due to an insecure direct object reference attack? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Executing commands on the server.&lt;br /&gt;
# Impersonating any user on the system.&lt;br /&gt;
# Modifying SQL data pointed to by the query.&lt;br /&gt;
# Modifying data without authorization. '''Correct'''&lt;br /&gt;
# Accessing a resource without authorization. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to mitigate the threat of an insecure direct object reference attack? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Use session-based indirection. '''Correct'''&lt;br /&gt;
# Use POST parameters instead of GET parameters. &lt;br /&gt;
# Perform an access check each time a resource identifier arrives as input. '''Correct'''&lt;br /&gt;
# Send successful logins to a well-known location instead of automatic redirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following threats are most likely to be caused by poor input validation? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Cross-site scripting '''Correct'''&lt;br /&gt;
# Insecure direct object reference '''Correct''' &lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Insufficient transport layer protection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the most common results of a cross-site request forgery? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Elevation of privilege '''Correct'''&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Spoofing and tampering '''Correct'''&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Misconfigured or disabled security features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are most often associated with a security misconfiguration threat? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Unused services '''Correct'''&lt;br /&gt;
# Default accounts '''Correct'''&lt;br /&gt;
# Bad cryptography &lt;br /&gt;
# Unsafe key storage &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to reevaluate your environment and address new threats? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Add or remove network segments. '''Correct'''&lt;br /&gt;
# Apply the latest service packs, patches, hotfixes, and updates. '''Correct'''&lt;br /&gt;
# Use custom cryptographic algorithms. &lt;br /&gt;
# Use your browser to forge unauthorized requests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following procedures are involved in the hardening process? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Disable unnecessary features. '''Correct'''&lt;br /&gt;
# Review all settings/configurations. '''Correct'''&lt;br /&gt;
# Repeat the process at random intervals.&lt;br /&gt;
# Update the environment with changes only when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequences are most likely to result if your production environment does not match your development, testing, and staging environments? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Your application may not work as expected. '''Correct'''&lt;br /&gt;
# Your application may not authenticate users as expected. '''Correct''' &lt;br /&gt;
# Your application may be expensive to administer.&lt;br /&gt;
# Your application may have too many configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following can result in insecure cryptography? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# Unused services&lt;br /&gt;
# Default accounts &lt;br /&gt;
# Failure to rotate keys '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are most likely to result in insecure cryptography? (Choose two.) &lt;br /&gt;
&lt;br /&gt;
# Custom cryptographic algorithms '''Correct'''&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# New products &lt;br /&gt;
# Missing patches&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following may result in cryptographic weakness? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Poor/weak algorithm choice '''Correct'''&lt;br /&gt;
# Custom cryptographic algorithms '''Correct'''&lt;br /&gt;
# Insufficient cryptographic protocols '''Correct'''&lt;br /&gt;
# Missing patches&lt;br /&gt;
# Unnecessary/unused services or features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following protocols are network layer encryption protocols? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# EFS &lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following factors help you secure keys? (Choose three.)&lt;br /&gt;
&lt;br /&gt;
# Complexity '''Correct'''&lt;br /&gt;
# Rotation '''Correct'''&lt;br /&gt;
# Randomness '''Correct'''&lt;br /&gt;
# Encryption &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following depict the typical impact of failure to restrict URL access? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Attackers access other users’ accounts and data. '''Correct'''&lt;br /&gt;
# Attackers impersonate any user on the system.&lt;br /&gt;
# Attackers invoke functions and services they have no authorization for. '''Correct'''&lt;br /&gt;
# Attackers perform all actions that the victims themselves have permission to perform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to verify the implementation of your Web application? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Use policy mechanisms. &lt;br /&gt;
# Use a simple and positive model at every layer. &lt;br /&gt;
# Verify that each URL in your application is appropriately protected. '''Correct'''&lt;br /&gt;
# Use your browser to forge unauthorized requests. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following should you use to protect the connections between the physical tiers of your application? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# EFS &lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to implement transport layer protection? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Install IDS&lt;br /&gt;
# Enable SSL '''Correct'''&lt;br /&gt;
# Set the HttpOnly flag on session ID cookies &lt;br /&gt;
# Enable IPSec '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to protect a Web application from unvalidated redirects and forwards? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Validate the referrer header '''Correct'''&lt;br /&gt;
# Use extended validation certificates &lt;br /&gt;
# Validate all input from the client '''Correct'''&lt;br /&gt;
# Disallow requests to unauthorized file types &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In which of the following scenarios should you use the escaping technique? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# When user input is echoed back to the user in HTML '''Correct'''&lt;br /&gt;
# When you need to validate any input as valid input &lt;br /&gt;
# When you are trying to protect against regular expression injection &lt;br /&gt;
# When you need to tell the interpreter that input is data and not code '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are the best ways to prevent unvalidated redirect and forwards vulnerabilities? (Choose two.)&lt;br /&gt;
&lt;br /&gt;
# Use an allow list, such as table indirection. '''Correct'''&lt;br /&gt;
# Use client-side validation. &lt;br /&gt;
# Allow only relative redirects. '''Correct'''&lt;br /&gt;
# Use session-based indirection.&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=115060</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Single Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=115060"/>
				<updated>2011-08-04T16:25:24Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Under Construction'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions - Single Select'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequences is most likely to occur due to an injection attack? &lt;br /&gt;
&lt;br /&gt;
# Spoofing &lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Denial of service '''Correct'''&lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application?&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios is most likely to cause an injection attack?&lt;br /&gt;
&lt;br /&gt;
# Unvalidated input is embedded in an instruction stream. '''Correct'''&lt;br /&gt;
# Unvalidated input can be distinguished from valid instructions. &lt;br /&gt;
# A Web application does not validate a client’s access to a resource. &lt;br /&gt;
# A Web action performs an operation on behalf of the user without checking a shared secret. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A user is able to pass malicious input that invokes control codes in your Web application. Which vulnerability is most likely to occur in your Web application?&lt;br /&gt;
&lt;br /&gt;
# Injection '''Correct'''&lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Failure to restrict URL access &lt;br /&gt;
# Insufficient transport layer protection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to protect against injection attacks?&lt;br /&gt;
&lt;br /&gt;
# SQL queries based on user input&lt;br /&gt;
# Input validation using an allow list '''Correct'''&lt;br /&gt;
# Memory size checks&lt;br /&gt;
# Validate integer values before referencing arrays&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is most vulnerable to injection attacks?&lt;br /&gt;
&lt;br /&gt;
# Session IDs&lt;br /&gt;
# Registry keys &lt;br /&gt;
# Regular expressions '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which character is most likely to be used for an SQL injection attack? &lt;br /&gt;
&lt;br /&gt;
# Single quote (') '''Correct'''&lt;br /&gt;
# Null (\0) byte&lt;br /&gt;
# Less than sign(&amp;lt;)&lt;br /&gt;
# Greater than sign(&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which mitigation technique can help you strictly define valid input?&lt;br /&gt;
&lt;br /&gt;
# Allow list '''Correct'''&lt;br /&gt;
# Memory size checks &lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following architecture-level techniques are the best approaches to prevent attacks based on malicious input? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Table indirection '''Correct'''&lt;br /&gt;
# Escaping &lt;br /&gt;
# Memory size checks &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which mitigation technique helps you tell the parser that a specific character is a literal and not a control character? &lt;br /&gt;
&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Allow list &lt;br /&gt;
# Escaping '''Correct'''&lt;br /&gt;
# Block list &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
You should use a blacklist wherever possible; use whitelists only as a secondary defense. &lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to define disallowed inputs? &lt;br /&gt;
&lt;br /&gt;
# Allow list &lt;br /&gt;
# Block list '''Correct'''&lt;br /&gt;
# Table indirection &lt;br /&gt;
# Escaping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following are injection attacks?&lt;br /&gt;
&lt;br /&gt;
# Cross-site scripting '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
# Insecure direct object references &lt;br /&gt;
# Broken authentication and session management&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following languages are the primary targets of cross-site scripting? &lt;br /&gt;
&lt;br /&gt;
# HTML '''Correct'''&lt;br /&gt;
# SQL &lt;br /&gt;
# XSLT&lt;br /&gt;
# XPath &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following attacks occurs when a malicious user convinces a victim to send a request to a server with malicious input and the server echoes the input back to client?&lt;br /&gt;
&lt;br /&gt;
# Reflected XSS '''Correct''' &lt;br /&gt;
# Persistent XSS &lt;br /&gt;
# Insecure direct object references&lt;br /&gt;
# Failure to restrict URL access&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to prevent a DOM-based XSS attack? &lt;br /&gt;
&lt;br /&gt;
# Set the HttpOnly flag in cookies &lt;br /&gt;
# Ensure that session IDs are not exposed in a URL &lt;br /&gt;
# Ensure that a different nonce is created for each request &lt;br /&gt;
# Validate any input that comes from another Web site '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How does malicious input flow in a DOM-based XSS? &lt;br /&gt;
&lt;br /&gt;
# From server to client&lt;br /&gt;
# From client to itself '''Correct'''&lt;br /&gt;
# From attacker to server &lt;br /&gt;
# From victim to server &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to prevent malicious input exploiting your application?&lt;br /&gt;
&lt;br /&gt;
# Input validation using an allow List '''Correct'''&lt;br /&gt;
# Using encryption &lt;br /&gt;
# Using table indirection&lt;br /&gt;
# Using GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You should set the HttpOnly flag in a cookie to ensure that:&lt;br /&gt;
&lt;br /&gt;
# The cookie is not available to client scripts. '''Correct'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser.&lt;br /&gt;
# The cookie is sent over an encrypted channel. &lt;br /&gt;
# The cookie is a persistent cookie.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You should set a secure flag in a cookie to ensure that:&lt;br /&gt;
&lt;br /&gt;
# The cookie is a persistent cookie.&lt;br /&gt;
# The cookie is not available to client script. &lt;br /&gt;
# The cookie is sent over an encrypted channel. '''Correct'''&lt;br /&gt;
# The cookie is deleted when the user closes the browser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
An attacker submits data to the server and the data is stored on the server. Which type of vulnerability is most likely to occur in your application? &lt;br /&gt;
&lt;br /&gt;
# DOM-based XSS &lt;br /&gt;
# Reflected XSS &lt;br /&gt;
# Persistent XSS '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following input sources can be directly controlled by a malicious user? &lt;br /&gt;
&lt;br /&gt;
# GET/POST parameters '''Correct'''&lt;br /&gt;
# Server configuration files&lt;br /&gt;
# Ports &lt;br /&gt;
# Server code&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following scenarios is most likely to result in broken authentication and session management vulnerabilities? &lt;br /&gt;
&lt;br /&gt;
# Poorly implemented custom code is used. '''Correct'''&lt;br /&gt;
# Session-based indirection is used.&lt;br /&gt;
# Unused and unnecessary services, code, and DLLs are disabled. &lt;br /&gt;
# The HttpOnly flag is set in cookies. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take before implementing a custom authentication and session management system? &lt;br /&gt;
&lt;br /&gt;
# Find out if the HttpOnly flag is set in cookies.&lt;br /&gt;
# Find out if you can use a small extension to an existing component to implement the system. '''Correct'''&lt;br /&gt;
# Find out if form variables are available to store data. &lt;br /&gt;
# Find out if you need to use session-based indirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
When implementing an authentication or session system, you should ensure that new session IDs are not created at login.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following functionalities should you include in an authentication and session management system? &lt;br /&gt;
&lt;br /&gt;
# Logout functionality '''Correct'''&lt;br /&gt;
# Regular expressions&lt;br /&gt;
# Escaping functionality&lt;br /&gt;
# Forwarding system functionality&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Why should you use CAPTCHA? &lt;br /&gt;
&lt;br /&gt;
# To create cryptographically random session IDs &lt;br /&gt;
# To protect credentials by using encryption or cryptographic salt and hash &lt;br /&gt;
# To protect authentication systems from automated or brute-force attacks '''Correct'''&lt;br /&gt;
# To ensure that authentication systems implement inactivity timeout functionality &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you do before passing credentials over the network? &lt;br /&gt;
&lt;br /&gt;
# Replace the credentials with a cryptographic salt and hash. '''Correct'''&lt;br /&gt;
# Accept session IDs from URLs. &lt;br /&gt;
# Share the credentials with the client. &lt;br /&gt;
# Use persistent cookies to manage session IDs. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which location should you ideally use to store a session ID?&lt;br /&gt;
&lt;br /&gt;
# URLs &lt;br /&gt;
# Form variables&lt;br /&gt;
# Persistent cookies &lt;br /&gt;
# Non-persistent cookies '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to ensure that JavaScript cannot be used to access a cookie?&lt;br /&gt;
&lt;br /&gt;
# Set the secure flag in the cookie &lt;br /&gt;
# Set the HttpOnly flag in the cookie '''Correct'''&lt;br /&gt;
# Use the CAPTCHA system&lt;br /&gt;
# Use non-persistent cookies &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is an authentication system mandatory requirement? &lt;br /&gt;
&lt;br /&gt;
# Form variables are used for managing session IDs.&lt;br /&gt;
# Use a GOTCHA to prevent automated attacks.&lt;br /&gt;
# User logout and session inactivity controls. '''Correct'''&lt;br /&gt;
# Session IDs are only accepted from cookies and parameter variables.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A session-based system authenticates a user to a Web site to provide access to restricted resources. To increase security in this scenario, an authentication token should meet which of the following requirements? &lt;br /&gt;
&lt;br /&gt;
# It should identify returning users to the site. &lt;br /&gt;
# It should be public information.&lt;br /&gt;
# It should always use a persistent cookie. &lt;br /&gt;
# It should always use a non-persistent cookie. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
An identification token is a replacement for a user’s credentials and should allow access to restricted resources of a Web site.&lt;br /&gt;
&lt;br /&gt;
# True &lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following tasks is performed by a session-based system? &lt;br /&gt;
&lt;br /&gt;
# Identifying returning users '''Correct'''&lt;br /&gt;
# Using form variables for managing session IDs &lt;br /&gt;
# Using the HTTP protocol &lt;br /&gt;
# Sending successful logins to a well-known location &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat is most likely to occur when a Web application fails to validate a client's access to a resource?&lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following objects is most susceptible to an insecure direct object reference attack?&lt;br /&gt;
&lt;br /&gt;
# Nonpersistent cookies &lt;br /&gt;
# Registry keys '''Correct'''&lt;br /&gt;
# Conditional constructs &lt;br /&gt;
# GET/POST parameters &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following vulnerabilities is most likely to occur due to an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Executing commands on the server.&lt;br /&gt;
# Impersonating any user on the system.&lt;br /&gt;
# Modifying SQL data pointed to by the query.&lt;br /&gt;
# Accessing a resource without authorization. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to mitigate the threat of an insecure direct object reference attack? &lt;br /&gt;
&lt;br /&gt;
# Use session-based indirection. '''Correct'''&lt;br /&gt;
# Use POST parameters instead of GET parameters. &lt;br /&gt;
# Use a regular expression.&lt;br /&gt;
# Send successful logins to a well-known location instead of automatic redirection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
Time of Check Time of Use (TOCTOU) occurs if the authorization check is performed on one page of a Web site and the resource is used on a different page.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Your Web application stores information about many accounts. Which threat is your Web application susceptible to if you can manipulate the URL of an account page to access all accounts? &lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Injection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following threats is most likely to be caused by poor input validation? &lt;br /&gt;
&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Insecure direct object reference '''Correct'''&lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Insufficient transport layer protection&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which threat is most likely to occur when a POST parameter performs an operation on behalf of a user without checking a shared secret?&lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery '''Correct'''&lt;br /&gt;
# Insecure direct object reference&lt;br /&gt;
# Cross-site scripting &lt;br /&gt;
# Injection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the most common result of a cross-site request forgery? &lt;br /&gt;
&lt;br /&gt;
# Elevation of privilege '''Correct''' &lt;br /&gt;
# Disabled security features&lt;br /&gt;
# Enabling of IPSec&lt;br /&gt;
# Misconfigured security features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
An attacker lures a victim to malicious content on a Web site. A request is automatically sent to the vulnerable site which includes victim’s credentials. Which attack is most likely to occur in this scenario?&lt;br /&gt;
&lt;br /&gt;
# Injection&lt;br /&gt;
# Cross-site scripting&lt;br /&gt;
# Insecure direct object reference&lt;br /&gt;
# Cross-site request forgery '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
The downside of a nonce is that it needs to be stored on the client.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What should you add to an HMAC to ensure that the secret value is unique for each request?&lt;br /&gt;
&lt;br /&gt;
# Salt &lt;br /&gt;
# Nonce &lt;br /&gt;
# Session ID &lt;br /&gt;
# Timestamp '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following practices should you observe in order to implement defense-in-depth techniques against CSRF attacks?&lt;br /&gt;
&lt;br /&gt;
# Use GET parameters&lt;br /&gt;
# Use automatic redirection. &lt;br /&gt;
# Don’t include secrets in the URL. '''Correct'''&lt;br /&gt;
# Resubmit POST parameters during redirection.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
HTTP GET parameters limit the types of manipulation a malicious user can perform on the victim to forge a request.&lt;br /&gt;
&lt;br /&gt;
# True&lt;br /&gt;
# False '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following mistakes is most often associated with a security misconfiguration threat? &lt;br /&gt;
&lt;br /&gt;
# Cross-site request forgery&lt;br /&gt;
# Failure to disable default accounts '''Correct'''&lt;br /&gt;
# Bad cryptography &lt;br /&gt;
# Unsafe key storage &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You have not yet applied some recent service packs and updates to your Web application. Which of the following threats is your Web server susceptible to?&lt;br /&gt;
&lt;br /&gt;
# Injection &lt;br /&gt;
# Security misconfiguration '''Correct'''&lt;br /&gt;
# Insecure cryptographic storage &lt;br /&gt;
# Cross-site request forgery &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to reevaluate your environment and address new threats? &lt;br /&gt;
&lt;br /&gt;
# Add or remove network segments. '''Correct'''&lt;br /&gt;
# Use the white-list validation of allowed input technique. &lt;br /&gt;
# Use custom cryptographic algorithms. &lt;br /&gt;
# Use your browser to forge unauthorized requests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following procedures are involved in the hardening process? &lt;br /&gt;
&lt;br /&gt;
# Disable unnecessary features. '''Correct'''&lt;br /&gt;
# Resubmit POST parameters during redirection.&lt;br /&gt;
# Repeat the process at random intervals.&lt;br /&gt;
# Update the environment with changes only when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following consequence is most likely to result if your production environment does not match your development, testing, and staging environments? &lt;br /&gt;
&lt;br /&gt;
# Your application may not work as expected. '''Correct'''&lt;br /&gt;
# Testing your application may take a long time. &lt;br /&gt;
# Your application may be expensive to administer.&lt;br /&gt;
# Your application may have too many configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following can result in insecure cryptography?&lt;br /&gt;
&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# Unused services&lt;br /&gt;
# Default accounts &lt;br /&gt;
# Rotating keys frequently &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is most likely to result in insecure cryptography? &lt;br /&gt;
 &lt;br /&gt;
# Unused services&lt;br /&gt;
# Unsalted hash '''Correct'''&lt;br /&gt;
# New products &lt;br /&gt;
# Missing patches&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following may result in cryptographic weakness? &lt;br /&gt;
&lt;br /&gt;
# Failure to restrict URL access&lt;br /&gt;
# Insufficient cryptographic protocols '''Correct'''&lt;br /&gt;
# Missing patches&lt;br /&gt;
# Unnecessary/unused services or features&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following protocols is a network layer encryption protocol?&lt;br /&gt;
 &lt;br /&gt;
# HTTP &lt;br /&gt;
# EFS &lt;br /&gt;
# IPSec '''Correct'''&lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following factors helps you secure keys? &lt;br /&gt;
&lt;br /&gt;
# Complexity '''Correct'''&lt;br /&gt;
# Session-based indirection &lt;br /&gt;
# Escaping &lt;br /&gt;
# Encryption &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following combines public-key cryptography with a cryptographic hash?&lt;br /&gt;
&lt;br /&gt;
# Nonce&lt;br /&gt;
# Digital signature '''Correct'''&lt;br /&gt;
# SSL&lt;br /&gt;
# Salt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following depicts the typical impact of failure to restrict URL access?&lt;br /&gt;
&lt;br /&gt;
# Attackers perform man-in-the-middle attacks.&lt;br /&gt;
# Attackers impersonate any user on the system.&lt;br /&gt;
# Attackers invoke functions and services they have no authorization for. '''Correct'''&lt;br /&gt;
# Attackers perform all actions that the victims themselves have permission to perform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following actions should you take to test the security of your Web application? &lt;br /&gt;
&lt;br /&gt;
# Use policy mechanisms. &lt;br /&gt;
# Use a simple and positive model at every layer. &lt;br /&gt;
# Set the secure flag on session ID cookies. &lt;br /&gt;
# Use your browser to forge unauthorized requests. '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following should you use to protect the connections between the physical tiers of your application? &lt;br /&gt;
&lt;br /&gt;
# EFS &lt;br /&gt;
# SSL '''Correct'''&lt;br /&gt;
# HTTP &lt;br /&gt;
# Kerberos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to implement transport layer protection?&lt;br /&gt;
&lt;br /&gt;
# Install IDS&lt;br /&gt;
# Enable SSL '''Correct'''&lt;br /&gt;
# Set the HttpOnly flag on session ID cookies &lt;br /&gt;
# Perform client-side validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is most likely to result from unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Brute force attack &lt;br /&gt;
# Network sniffing &lt;br /&gt;
# Man-in-the-middle attack &lt;br /&gt;
# Bypassed authorization checks '''Correct'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to protect a Web application from unvalidated redirects and forwards? &lt;br /&gt;
&lt;br /&gt;
# Validate the referrer header. '''Correct'''&lt;br /&gt;
# Use extended validation certificates. &lt;br /&gt;
# Use the escaping technique. &lt;br /&gt;
# Disallow requests to unauthorized file types. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Which of the following is the best way to detect unvalidated redirects and forwards?&lt;br /&gt;
&lt;br /&gt;
# Use internal transfers without authorizing the user for target URL &lt;br /&gt;
# Use your browser to forge unauthorized requests&lt;br /&gt;
# Use weblogs to identify redirects and forwards '''Correct'''&lt;br /&gt;
# Use policy mechanisms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False. &lt;br /&gt;
Most security issues are related to input and a user’s ability to interact with and control input.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
State whether the following statement is True or False.&lt;br /&gt;
If user input can be confused for instructions in the language or the way the language is applied, then the language is vulnerable to an injection attack.&lt;br /&gt;
&lt;br /&gt;
# True '''Correct'''&lt;br /&gt;
# False &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In which of the following scenarios should you use the escaping technique? &lt;br /&gt;
&lt;br /&gt;
# When user input is echoed back to the user in HTML '''Correct'''&lt;br /&gt;
# When you need to validate any input as valid input &lt;br /&gt;
# When you are trying to protect against regular expression injection &lt;br /&gt;
# When you need to tell the interpreter that input is code&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Which of the following is the best way to prevent unvalidated redirect and forwards vulnerabilities?&lt;br /&gt;
&lt;br /&gt;
# Use an allow list, such as table indirection. '''Correct'''&lt;br /&gt;
# Use client-side validation. &lt;br /&gt;
# Allow only absolute redirects. &lt;br /&gt;
# Use session-based indirection.&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=114917</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Multiple Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=114917"/>
				<updated>2011-08-02T14:26:44Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Under Construction'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions - Multiple Select'''&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=114916</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Single Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=114916"/>
				<updated>2011-08-02T14:26:24Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Under Construction'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions - Single Select'''&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=114915</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Multiple Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Multiple_Select&amp;diff=114915"/>
				<updated>2011-08-02T14:25:40Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: Created page with &amp;quot;'''Under Construction'''  &amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;  &amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;  &amp;lt;center&amp;gt;'''Exam Questions'''&amp;lt;/center&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Under Construction'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions'''&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=114914</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Single Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=114914"/>
				<updated>2011-08-02T14:24:13Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Under Construction'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Course Title: OWASP Top 10 Threats and Mitigation'''&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''Exam Questions'''&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=114913</id>
		<title>OWASP Top 10 Threats and Mitigations Exam - Single Select</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Top_10_Threats_and_Mitigations_Exam_-_Single_Select&amp;diff=114913"/>
				<updated>2011-08-02T14:21:54Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: Created page with &amp;quot;'''Under Construction'''&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Under Construction'''&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Training&amp;diff=105558</id>
		<title>OWASP Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Training&amp;diff=105558"/>
				<updated>2011-02-22T14:09:24Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== About ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| &lt;br /&gt;
=== OWASP Training - OWASP Projects and Resources you can use TODAY!  ===&lt;br /&gt;
&lt;br /&gt;
The main goal of '''OWASP Training''' is to support Local Chapters' training activities in a way that allows us to use a model that, despite specific and punctual adjustments, can be easily replicated and become the main frame for all Chapter-led training events. &lt;br /&gt;
&lt;br /&gt;
Furthermore, we will use the concept “'''OWASP projects and resources you can use TODAY!'''” &lt;br /&gt;
&lt;br /&gt;
In a nutshell, we are proposing a '''Chapter’s driven model with Local Chapter organization''' in which: &lt;br /&gt;
&lt;br /&gt;
* The courses are '''free for OWASP members''' - being that by the time of the training event anyone may become a member if they desire to do so; &lt;br /&gt;
* The contents are '''OWASP projects focused''' – to promote the awareness of our Projects and the understanding of how they fit into an Enterprise's security ecosystem or in its Web Application Development Life-cycle; &lt;br /&gt;
* The '''costs''' are '''supported by a mix of funding''' - local chapter budget, external sponsorship, trainers sponsorship (i.e. trip and/or accommodation paid by themselves) and local chapter members’ sponsorship (i.e. taking trainers in as guests).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; |&lt;br /&gt;
'''If you would like to organize a training event of this sort''', please contact me after gathering the following information which will be our starting point: &lt;br /&gt;
* Date of the event; &lt;br /&gt;
* Venue and directions; &lt;br /&gt;
* Course’s details - with regard to the contents, we would suggest that the focus falls into the OWASP Projects with the most quality and Projects being developed by members of your local Chapter. &lt;br /&gt;
&lt;br /&gt;
'''The role of the Local Chapters in reinforcing visibility of OWASP Projects within the local corporate communities and, by that, in encouraging the use and understanding of our tools and documentation is absolutely invaluable – do get involved!''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in '''being part of OWASP's pool of Trainers''', check our '''[http://www.owasp.org/index.php/OWASP_Training#tab=Trainers_Database_-_Call_for_Trainers.21 CALL FOR TRAINERS tab]''' and add your name!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Initiatives ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
*[http://www.owasp.org/index.php/London/Training/OWASP_projects_and_resources_you_can_use_TODAY#tab=Training_-_April.2C_16th.2C_2010_.28Closed.29 London Training Day], April, 16th, 2010, London, UK&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/London/Training/OWASP_projects_and_resources_you_can_use_TODAY#tab=Training_-_May.2C_28th.2C_2010 London Training Day], May, 28th, 2010, London, UK&lt;br /&gt;
&lt;br /&gt;
*[[Benelux Training|BeNeLux Training Day]], December, 1st, 2010, Leuven, Belgium &amp;amp;#124; Part of the [[BeNeLux OWASP Day 2010|BeNeLux OWASP Day 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[IBWAS10 Training|IBWAS'10 Training Day]], December, 16th, 2010, Lisbon, Portugal &amp;amp;#124; Part of the [[IBWAS10|2nd OWASP Ibero-American Web Application Security Conference (IBWAS'10)]] &lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Ireland/Training/OWASP_projects_and_resources_you_can_use_TODAY Ireland Training Day], March, 11, 2011, Dublin, Ireland&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/France/OWASP_projects_and_resources_you_can_use_TODAY France Training Day], 26th April 2011, Paris, France&lt;br /&gt;
&lt;br /&gt;
*[[NYNJ Training/OWASP Projects and Resources you can use TODAY!|NYNJ Training Day]], 1st Semester 2011 (date tbc), NY, US&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== '''Trainers Database - Call for Trainers!''' ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
=== '''CALL FOR TRAINERS - Trainers drive's goal'''  ===&lt;br /&gt;
&lt;br /&gt;
'''OWASP is looking for trainers''' to deliver training under the flag “OWASP projects and resources you can use today”. This is a model of training which is '''free for OWASP members''', '''delivered by OWASP Leaders''' (with only travel expenses paid) and '''covering OWASP modules and/or projects'''.&lt;br /&gt;
&lt;br /&gt;
'''If you are an OWASP Leader and would like to be included in OWASP's pool of trainers, this is your chance - add your name and info to the OWASP Trainers / Volunteers Table and be counted!''' &lt;br /&gt;
&lt;br /&gt;
The role of the Local Chapters in reinforcing visibility of OWASP Projects within the local corporate communities and, by that, in encouraging the use and understanding of our tools and documentation is absolutely invaluable. In this context, the OWASP Training appears as an excellent vehicle to spread the knowledge and the word and that is why this is one of the areas we want to strongly focus on. &lt;br /&gt;
&lt;br /&gt;
'''Click [[OWASP Trainers Database Conditions|here]] for rules and conditions.'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP Trainers Database ===&lt;br /&gt;
{{Template:OWASP_Trainers_Volunteers/Columns}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_1 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_2 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_3 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_4 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_5 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_6 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_7 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_8 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_9 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_10 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_11 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_12 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_14 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_15 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_16 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_17 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_18 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_19 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_20 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_21 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_22 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_23 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_24 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_25 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_26 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_27 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_28 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_29 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_30 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Videos &amp;amp; Pictures ====&lt;br /&gt;
&lt;br /&gt;
=== IBWAS'10 Training Day, 16 Dec 2010 ===&lt;br /&gt;
&lt;br /&gt;
{{:IBWAS10 Videos and Pictures}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Modules and Materials ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
=== Training Modules ===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Code Crawler Project|OWASP Code Crawler Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Code Review Project|OWASP Code Review Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP DirBuster Project|OWASP DirBuster Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP ESAPI|OWASP ESAPI]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/Guided tour of OWASP Projects|Guided tour of OWASP Projects]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP O2 Platform|OWASP O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Secure Coding Practices - Quick Reference Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Software Assurance Maturity Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Testing Guide|OWASP Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/Threat Risk Modeling|OWASP Threat Risk Modeling]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Top 10|OWASP Top 10]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP WebGoat Project|OWASP WebGoat Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP WebScarab Project|OWASP WebScarab Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Webslayer Project|OWASP Webslayer Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/Implementation of Enigform for Wordpress|OWASP Enigform (and Jify)]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
=== OWASP Appsec Tutorial Series, by [[user:Jerryhoff|Jerry Hoff]] ===&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=CDbWvEwBBxo Episode 1: Appsec Basics]&lt;br /&gt;
*[http://www.youtube.com/watch?v=pypTYPaU7mM Episode 2: Injection Attacks] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Other Training Materials ===&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/owasp-training/downloads/detail?name=OWASP%20Default%20Training.zip&amp;amp;can=2&amp;amp;q= OWASP Default Training]&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/owasp-training/downloads/detail?name=London%20Training%20May%2028th%202010.zip&amp;amp;can=2&amp;amp;q= London Training May 28th 2010]&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/owasp-training/downloads/detail?name=London%20Training%20April%2016th%202010.zip&amp;amp;can=2&amp;amp;q= London Training April 16th 2010] &lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/File:Developing_Compliant_Applications.pdf Developing Compliant Applications (pdf)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/File:Developing_Secure_Applications_with_OWASP.pdf Developing Secure Applications with OWASP (pdf)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Videos ===&lt;br /&gt;
&lt;br /&gt;
'''IBWAS'10 Training Day sessions, 16th Dec 2010, Lisbon'''&lt;br /&gt;
&lt;br /&gt;
{{:IBWAS10 Training Day Sessions}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Library of Links ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| &lt;br /&gt;
* Access to the collection of all pages associated to the [[:Category:OWASP Training|'''OWASP Training''']].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Training Templates ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| &lt;br /&gt;
* If you want to organize an OWASP Free Training event, please check out the [[:Category:OWASP Free Training Templates|'''Training Templates''']].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Training Logos ====&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP Training Pictures }}&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Training_Pictures_View &lt;br /&gt;
| Media_File1 = '''PROPOSAL 1A'''[[Image:Logo 1A.JPG]]&lt;br /&gt;
| Media_File2 = '''PROPOSAL 1B - Approved Version'''[[Image:Logo 1B.JPG]]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Training_Pictures_View &lt;br /&gt;
| Media_File1 =  '''PROPOSAL 2'''[[Image:Logo 2.JPG]]&lt;br /&gt;
| Media_File2 =  '''PROPOSAL 3'''[[Image:Logo 3.JPG]]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Training_Pictures_View &lt;br /&gt;
| Media_File1 =  '''PROPOSAL 4'''[[Image:Logo 4.JPG]]&lt;br /&gt;
| Media_File2 =  &lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Training|Training]]&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Training&amp;diff=105557</id>
		<title>OWASP Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Training&amp;diff=105557"/>
				<updated>2011-02-22T14:09:01Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== About ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| &lt;br /&gt;
=== OWASP Training - OWASP Projects and Resources you can use TODAY!  ===&lt;br /&gt;
&lt;br /&gt;
The main goal of '''OWASP Training''' is to support Local Chapters' training activities in a way that allows us to use a model that, despite specific and punctual adjustments, can be easily replicated and become the main frame for all Chapter-led training events. &lt;br /&gt;
&lt;br /&gt;
Furthermore, we will use the concept “'''OWASP projects and resources you can use TODAY!'''” &lt;br /&gt;
&lt;br /&gt;
In a nutshell, we are proposing a '''Chapter’s driven model with Local Chapter organization''' in which: &lt;br /&gt;
&lt;br /&gt;
* The courses are '''free for OWASP members''' - being that by the time of the training event anyone may become a member if they desire to do so; &lt;br /&gt;
* The contents are '''OWASP projects focused''' – to promote the awareness of our Projects and the understanding of how they fit into an Enterprise's security ecosystem or in its Web Application Development Life-cycle; &lt;br /&gt;
* The '''costs''' are '''supported by a mix of funding''' - local chapter budget, external sponsorship, trainers sponsorship (i.e. trip and/or accommodation paid by themselves) and local chapter members’ sponsorship (i.e. taking trainers in as guests).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; |&lt;br /&gt;
'''If you would like to organize a training event of this sort''', please contact me after gathering the following information which will be our starting point: &lt;br /&gt;
* Date of the event; &lt;br /&gt;
* Venue and directions; &lt;br /&gt;
* Course’s details - with regard to the contents, we would suggest that the focus falls into the OWASP Projects with the most quality and Projects being developed by members of your local Chapter. &lt;br /&gt;
&lt;br /&gt;
'''The role of the Local Chapters in reinforcing visibility of OWASP Projects within the local corporate communities and, by that, in encouraging the use and understanding of our tools and documentation is absolutely invaluable – do get involved!''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in '''being part of OWASP's pool of Trainers''', check our '''[http://www.owasp.org/index.php/OWASP_Training#tab=Trainers_Database_-_Call_for_Trainers.21 CALL FOR TRAINERS tab]''' and add your name!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Initiatives ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
*[http://www.owasp.org/index.php/London/Training/OWASP_projects_and_resources_you_can_use_TODAY#tab=Training_-_April.2C_16th.2C_2010_.28Closed.29 London Training Day], April, 16th, 2010, London, UK&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/London/Training/OWASP_projects_and_resources_you_can_use_TODAY#tab=Training_-_May.2C_28th.2C_2010 London Training Day], May, 28th, 2010, London, UK&lt;br /&gt;
&lt;br /&gt;
*[[Benelux Training|BeNeLux Training Day]], December, 1st, 2010, Leuven, Belgium &amp;amp;#124; Part of the [[BeNeLux OWASP Day 2010|BeNeLux OWASP Day 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[IBWAS10 Training|IBWAS'10 Training Day]], December, 16th, 2010, Lisbon, Portugal &amp;amp;#124; Part of the [[IBWAS10|2nd OWASP Ibero-American Web Application Security Conference (IBWAS'10)]] &lt;br /&gt;
&lt;br /&gt;
== ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Ireland/Training/OWASP_projects_and_resources_you_can_use_TODAY Ireland Training Day], March, 11, 2011, Dublin, Ireland&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/France/OWASP_projects_and_resources_you_can_use_TODAY France Training Day], 26th April 2011, Paris, France&lt;br /&gt;
&lt;br /&gt;
*[[NYNJ Training/OWASP Projects and Resources you can use TODAY!|NYNJ Training Day]], 1st Semester 2011 (date tbc), NY, US&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== '''Trainers Database - Call for Trainers!''' ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
=== '''CALL FOR TRAINERS - Trainers drive's goal'''  ===&lt;br /&gt;
&lt;br /&gt;
'''OWASP is looking for trainers''' to deliver training under the flag “OWASP projects and resources you can use today”. This is a model of training which is '''free for OWASP members''', '''delivered by OWASP Leaders''' (with only travel expenses paid) and '''covering OWASP modules and/or projects'''.&lt;br /&gt;
&lt;br /&gt;
'''If you are an OWASP Leader and would like to be included in OWASP's pool of trainers, this is your chance - add your name and info to the OWASP Trainers / Volunteers Table and be counted!''' &lt;br /&gt;
&lt;br /&gt;
The role of the Local Chapters in reinforcing visibility of OWASP Projects within the local corporate communities and, by that, in encouraging the use and understanding of our tools and documentation is absolutely invaluable. In this context, the OWASP Training appears as an excellent vehicle to spread the knowledge and the word and that is why this is one of the areas we want to strongly focus on. &lt;br /&gt;
&lt;br /&gt;
'''Click [[OWASP Trainers Database Conditions|here]] for rules and conditions.'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP Trainers Database ===&lt;br /&gt;
{{Template:OWASP_Trainers_Volunteers/Columns}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_1 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_2 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_3 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_4 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_5 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_6 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_7 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_8 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_9 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_10 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_11 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_12 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_14 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_15 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_16 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_17 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_18 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_19 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_20 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_21 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_22 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_23 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_24 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_25 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_26 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_27 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_28 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_29 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_30 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Videos &amp;amp; Pictures ====&lt;br /&gt;
&lt;br /&gt;
=== IBWAS'10 Training Day, 16 Dec 2010 ===&lt;br /&gt;
&lt;br /&gt;
{{:IBWAS10 Videos and Pictures}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Modules and Materials ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
=== Training Modules ===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Code Crawler Project|OWASP Code Crawler Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Code Review Project|OWASP Code Review Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP DirBuster Project|OWASP DirBuster Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP ESAPI|OWASP ESAPI]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/Guided tour of OWASP Projects|Guided tour of OWASP Projects]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP O2 Platform|OWASP O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Secure Coding Practices - Quick Reference Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Software Assurance Maturity Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Testing Guide|OWASP Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/Threat Risk Modeling|OWASP Threat Risk Modeling]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Top 10|OWASP Top 10]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP WebGoat Project|OWASP WebGoat Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP WebScarab Project|OWASP WebScarab Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Webslayer Project|OWASP Webslayer Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/Implementation of Enigform for Wordpress|OWASP Enigform (and Jify)]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
=== OWASP Appsec Tutorial Series, by [[user:Jerryhoff|Jerry Hoff]] ===&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=CDbWvEwBBxo Episode 1: Appsec Basics]&lt;br /&gt;
*[http://www.youtube.com/watch?v=pypTYPaU7mM Episode 2: Injection Attacks] &lt;br /&gt;
&lt;br /&gt;
=== Other Training Materials ===&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/owasp-training/downloads/detail?name=OWASP%20Default%20Training.zip&amp;amp;can=2&amp;amp;q= OWASP Default Training]&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/owasp-training/downloads/detail?name=London%20Training%20May%2028th%202010.zip&amp;amp;can=2&amp;amp;q= London Training May 28th 2010]&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/owasp-training/downloads/detail?name=London%20Training%20April%2016th%202010.zip&amp;amp;can=2&amp;amp;q= London Training April 16th 2010] &lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/File:Developing_Compliant_Applications.pdf Developing Compliant Applications (pdf)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/File:Developing_Secure_Applications_with_OWASP.pdf Developing Secure Applications with OWASP (pdf)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Videos ===&lt;br /&gt;
&lt;br /&gt;
'''IBWAS'10 Training Day sessions, 16th Dec 2010, Lisbon'''&lt;br /&gt;
&lt;br /&gt;
{{:IBWAS10 Training Day Sessions}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Library of Links ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| &lt;br /&gt;
* Access to the collection of all pages associated to the [[:Category:OWASP Training|'''OWASP Training''']].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Training Templates ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| &lt;br /&gt;
* If you want to organize an OWASP Free Training event, please check out the [[:Category:OWASP Free Training Templates|'''Training Templates''']].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Training Logos ====&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP Training Pictures }}&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Training_Pictures_View &lt;br /&gt;
| Media_File1 = '''PROPOSAL 1A'''[[Image:Logo 1A.JPG]]&lt;br /&gt;
| Media_File2 = '''PROPOSAL 1B - Approved Version'''[[Image:Logo 1B.JPG]]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Training_Pictures_View &lt;br /&gt;
| Media_File1 =  '''PROPOSAL 2'''[[Image:Logo 2.JPG]]&lt;br /&gt;
| Media_File2 =  '''PROPOSAL 3'''[[Image:Logo 3.JPG]]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Training_Pictures_View &lt;br /&gt;
| Media_File1 =  '''PROPOSAL 4'''[[Image:Logo 4.JPG]]&lt;br /&gt;
| Media_File2 =  &lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Training|Training]]&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Fixed&amp;diff=104879</id>
		<title>Summit 2011 Schedule Fixed</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Fixed&amp;diff=104879"/>
				<updated>2011-02-10T18:10:08Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]]&lt;br /&gt;
&lt;br /&gt;
==== Work Model ====&lt;br /&gt;
&lt;br /&gt;
'''The Fixed Working Sessions Model'''&lt;br /&gt;
&lt;br /&gt;
Given the number of existent working sessions, trying to include them all into a fixed agenda would mean that each session would need to be allocated to a slot of 15 minutes. &lt;br /&gt;
&lt;br /&gt;
In order to make the Summit a hub of productive and meaningful discussions, we have decided that the fixed schedule would only include the sessions with:&lt;br /&gt;
* Higher number of attendees;&lt;br /&gt;
* Focus on matters of interest to the wider community.&lt;br /&gt;
&lt;br /&gt;
[[Summit_2011_Schedule_Dynamic|The rest of the sessions are scheduled during the Dynamic sessions, which are available HERE]]&lt;br /&gt;
&lt;br /&gt;
The fixed schedule working sessions are organized into 2 tracks in the 2 main conference rooms:&lt;br /&gt;
* [http://www.owasp.org/images/2/20/MASTER_FLOOR_COLOR_SMALL.jpg CampoReal 1]&lt;br /&gt;
* [http://www.owasp.org/images/2/20/MASTER_FLOOR_COLOR_SMALL.jpg Alentejo]&lt;br /&gt;
&lt;br /&gt;
Here is the list of the fixed schedule working sessions:&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Summit_2011_Schedule#tab=Tuesday.2C_Feb_8 Tuesday:]&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session010 XSS and the Frameworks: XSS - Awareness, Resources, and Partnerships]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session041 OWASP Training: OWASP Academies]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session043 WAF Mitigations for XSS: Virtual Patching Best Practices]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session089 OWASP Exams: University Outreach]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session055 Risk Metrics: Metrics and Labeling]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session036 Government Outreach]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session058 Counting and Scoring Application Security Defects]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session052 OWASP Testing Guide]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session068 Enterprise Web Defense Roundtable]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session099 Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Summit_2011_Schedule#tab=Wednesday.2C_Feb_9 Wednesday:]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session028 Protecting Information Stored Client-Side]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session085 Common structure and numbering for all guides: OWASP Common vulnerability list]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session030 Providing Access to Persisted Data]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session200 OWASP Secure Coding Practices Project]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session001 DOM Sandboxing: EcmaScript 5 Security]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session015 Industry]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session094 Microsoft's SDL in 16 steps (and lessons learned)]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session014 Projects]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session002 HTML5 Security]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session023 Overhauling the OWASP Website]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Summit_2011_Schedule#tab=Thursday.2C_Feb_10 Thursday:]&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session027 Contextual Output Encoding: ESAPI-CORE]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session013 OWASP Board/Committee Governance: Board Structure]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session033 ESAPI for Ruby: Applying ESAPI Input Validation]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session076 Professionalize OWASP: Should OWASP hire a Chief Executive Officer (CEO)?]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session005 Site Security Policy]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session039 OWASP Certification]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session022 What is an OWASP Leader? Tracking OWASP Participation]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session065 Mobile Security]&lt;br /&gt;
* [http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session090 OWASP Licensing]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
{{:Template:Summit 2011 Schedule/Columns}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 08h30 - 09h30&lt;br /&gt;
| EventName = Final Registration&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 09h40 - 10h00&lt;br /&gt;
| EventName = Summit Launch&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomA1  = 009&lt;br /&gt;
| RoomA2  = 010&lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 041&lt;br /&gt;
| RoomB2  = 040&lt;br /&gt;
| RoomB3  = &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomA1  = 043&lt;br /&gt;
| RoomA2  = 091&lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 089&lt;br /&gt;
| RoomB2  = 012&lt;br /&gt;
| RoomB3  =  &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 14h00 - 14h15&lt;br /&gt;
| EventName = Luis Magalhães - Head of [http://www.english.umic.pt/ '''Knowledge Society Agency'''] - addresses OWASP&amp;lt;br&amp;gt;  &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomA1  = 055&lt;br /&gt;
| RoomA2  = 057&lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 036&lt;br /&gt;
| RoomB2  = &lt;br /&gt;
| RoomB3  =  &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomA1  = 058&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 200&lt;br /&gt;
| RoomB2  = &lt;br /&gt;
| RoomB3  = &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomA1  = 068&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = &lt;br /&gt;
| RoomB2  = 099&lt;br /&gt;
| RoomB3  =  &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
{{:Template:Summit 2011 Schedule/Columns}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 09h40 - 10h00&lt;br /&gt;
| EventName = Keynote&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomA1  = 028&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 085&lt;br /&gt;
| RoomB2  = 201&lt;br /&gt;
| RoomB3  = &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomA1  = 030&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 052&lt;br /&gt;
| RoomB2  = &lt;br /&gt;
| RoomB3  =  &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 13h50&lt;br /&gt;
| EventName = Lunch &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time    = 14h00 - 15h20&lt;br /&gt;
| RoomA1  = 005&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  = &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 015&lt;br /&gt;
| RoomB2  = &lt;br /&gt;
| RoomB3  = &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time     = 15h30 - 16h45 &lt;br /&gt;
| RoomA1  = 094&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 014&lt;br /&gt;
| RoomB2  = &lt;br /&gt;
| RoomB3  = &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h45 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time     = 17h00 - 18h20 &lt;br /&gt;
| RoomA1  = 001&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  = &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 023&lt;br /&gt;
| RoomB2  = &lt;br /&gt;
| RoomB3  =  &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
{{:Template:Summit 2011 Schedule/Columns}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 09h40 - 10h00&lt;br /&gt;
| EventName = Keynote&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomA1  = 027&lt;br /&gt;
| RoomA2  = 034&lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 013&lt;br /&gt;
| RoomB2  = 054&lt;br /&gt;
| RoomB3  = &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomA1  = 033&lt;br /&gt;
| RoomA2  = 025&lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 076&lt;br /&gt;
| RoomB2  = 077&lt;br /&gt;
| RoomB3  =  &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 13h50&lt;br /&gt;
| EventName = Lunch &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time    = 14h00 - 15h20&lt;br /&gt;
| RoomA1  = 003&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  = &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 039&lt;br /&gt;
| RoomB2  = &lt;br /&gt;
| RoomB3  = &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time     = 15h30 - 16h45 &lt;br /&gt;
| RoomA1  = 002&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 022&lt;br /&gt;
| RoomB2  = 071&lt;br /&gt;
| RoomB3  = &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h45 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time     = 17h00 - 18h20 &lt;br /&gt;
| RoomA1  = 065&lt;br /&gt;
| RoomA2  = &lt;br /&gt;
| RoomA3  = &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = 090&lt;br /&gt;
| RoomB2  = &lt;br /&gt;
| RoomB3  =  &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 22h00  &lt;br /&gt;
| EventName = '''OWASP Band gig!!!'''&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Friday, Feb 11  ====&lt;br /&gt;
{{:Template:Summit 2011 Schedule/Columns}}&lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule/Rows &lt;br /&gt;
| Time      = 10h00 - 11h15 &lt;br /&gt;
| RoomA1  = &lt;br /&gt;
| RoomA2  =&lt;br /&gt;
| RoomA3  =  &lt;br /&gt;
| RoomA4  = &lt;br /&gt;
| RoomA5  = &lt;br /&gt;
| RoomB1  = &lt;br /&gt;
| RoomB2  = &lt;br /&gt;
| RoomB3  =  &lt;br /&gt;
| RoomB4  = &lt;br /&gt;
| RoomB5  = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h15 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 12h00 - 13h30&lt;br /&gt;
| EventName = '''Closing Session''' &amp;lt;br&amp;gt; Campo Real I Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104877</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104877"/>
				<updated>2011-02-10T18:06:34Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 957&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = &lt;br /&gt;
| VillaE_Number = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session077|'''Global Conferences Committee Monthly Meeting''']] - Lusitano Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session264|'''Planning South America/Central America AppSec''']] - Game Room &amp;lt;br&amp;gt;&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = 009&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Friday, Feb 11  ====&lt;br /&gt;
The Friday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Friday, please add the name of the session, time and location to the Schedule that is posted on the Information wall in the Operations Room.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 12h00 - 13h30&lt;br /&gt;
| EventName = '''Closing Session''' &amp;lt;br&amp;gt; Campo Real I Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104876</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104876"/>
				<updated>2011-02-10T18:03:29Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 957&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = &lt;br /&gt;
| VillaE_Number = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session077|'''Global Conferences Committee Monthly Meeting''']] - Lusitano Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session264|'''Planning South America/Central America AppSec''']] - Game Room &amp;lt;br&amp;gt;&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = 009&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Friday, Feb 11  ====&lt;br /&gt;
The Friday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Friday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Thursday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 12h00 - 13h30&lt;br /&gt;
| EventName = '''Closing Session''' &amp;lt;br&amp;gt; Campo Real I Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_Funding_session.pptx&amp;diff=104873</id>
		<title>File:Summit Funding session.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_Funding_session.pptx&amp;diff=104873"/>
				<updated>2011-02-10T17:22:23Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: uploaded a new version of &amp;amp;quot;File:Summit Funding session.pptx&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session252&amp;diff=104872</id>
		<title>Summit 2011 Working Sessions/Session252</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session252&amp;diff=104872"/>
				<updated>2011-02-10T17:19:45Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = &lt;br /&gt;
| summit_session_attendee_email1 = &lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = &lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = &lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5= &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6= &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7= &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8= &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9= &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10= &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11= &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12= &lt;br /&gt;
| summit_session_attendee_company12 =&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14= &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15= &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16= &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17= &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18= &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19= &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20= &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._secure_coding.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._secure_coding.jpg]]&lt;br /&gt;
| summit_session_name = ESAPI framework integration&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session252&lt;br /&gt;
| mailing_list =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Chris Schmidt&lt;br /&gt;
| summit_session_leader_email1 = &lt;br /&gt;
| summit_session_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = &lt;br /&gt;
| operational_leader_email1 = &lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session252&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session252&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104855</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104855"/>
				<updated>2011-02-10T14:39:57Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 957&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = &lt;br /&gt;
| VillaE_Number = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session077|'''Global Conferences Committee Monthly Meeting''']] - Lusitano Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session264|'''Planning South America/Central America AppSec''']] - Game Room &amp;lt;br&amp;gt;&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = 009&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Friday, Feb 11  ====&lt;br /&gt;
The Friday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Friday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Thursday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 14h00 - 15h00&lt;br /&gt;
| EventName = '''Closing Session''' &amp;lt;br&amp;gt; Campo Real I Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104853</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104853"/>
				<updated>2011-02-10T14:19:24Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 957&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = 099&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session077|'''Global Conferences Committee Monthly Meeting''']] - Lusitano Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session264|'''Planning South America/Central America AppSec''']] - Game Room &amp;lt;br&amp;gt;&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = &lt;br /&gt;
| VillaE_Number = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Friday, Feb 11  ====&lt;br /&gt;
The Friday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Friday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Thursday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 14h00 - 15h00&lt;br /&gt;
| EventName = '''Closing Session''' &amp;lt;br&amp;gt; Campo Real I Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session019&amp;diff=104819</id>
		<title>Summit 2011 Working Sessions/Session019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session019&amp;diff=104819"/>
				<updated>2011-02-10T12:47:41Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Nishi Kumar&lt;br /&gt;
| summit_session_attendee_email1 = nishi.kumar@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1= FIS&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Cecil Su&lt;br /&gt;
| summit_session_attendee_email2 = cecil.su@owasp.org&lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2= GT&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Jason Taylor&lt;br /&gt;
| summit_session_attendee_email3 = jtaylor@securityinnovation.com&lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._global_committees.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._global_commitee.jpg‎]]&lt;br /&gt;
| summit_session_name = Education&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019&lt;br /&gt;
| mailing_list =&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= Define goals for the up coming year&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
Estimate how the past achievements do support the current educational developments &lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
Evaluate how we can get the projects involved in developing (or at least reviewing) training material&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
Define new goals for the upcoming period&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
Define success factors for the upcoming period&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = The OWASP 2011 Education Plan – describing the specific plans for education in 2011 with schedule, targets, action plans, etc…&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Martin Knobloch &lt;br /&gt;
| summit_session_leader_email1 = martin.knobloch@owasp.org&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session019&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session019&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104813</id>
		<title>Summit 2011/Media</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104813"/>
				<updated>2011-02-10T12:31:19Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Press Releases ===&lt;br /&gt;
* January, 28, 2011 - [http://www.owasp.org/images/d/db/Comunicado_OWASP_280110.pdf Portuguese] and [http://www.owasp.org/images/9/97/Pressrelease_OWASP_280110.pdf English] Versions.&lt;br /&gt;
&lt;br /&gt;
=== Media Mentions ===&lt;br /&gt;
&lt;br /&gt;
'''Mensagem de Jeff Williams, Membro da Board da Fundação OWASP''' (Portuguese)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Na sequência da notícia “Especialistas alertam para falhas na segurança de sites portugueses”, publicada a 7 de Fevereiro pela Agência Lusa, a OWASP esclarece que a actual situação de Portugal não é diferente da de outros países da União Europeia.  Aliás, é de enaltecer  o envolvimento de Portugal com a OWASP no sentido de iniciar o processo de abordagem à segurança aplicacional e acreditamos que Portugal tem a oportunidade e a capacidade para liderar esta área critica das Tecnologias da Informação.&lt;br /&gt;
Queremos, com este email, salientar que as declarações feitas pelos elementos da OWASP, no âmbito da realização do referido artigo, tinham um objectivo de sensibilização e não o de causar nenhum tipo de equívoco ou dúvida relativamente à situação portuguesa.&lt;br /&gt;
Neste contexto, e se considerarem relevante, agradecemos à Agência Lusa o favor de divulgar este esclarecimento.&lt;br /&gt;
Cumprimentos,&lt;br /&gt;
 &lt;br /&gt;
Jeff Williams&lt;br /&gt;
OWASP Board Member&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Message of Jeff Williams, OWASP Board Member''' (English)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP requests a clarification on the article, “Especialistas alertam para falhas na segurança de sites portugueses” published on the 7th of February. We wish to make it absolutely clear that the application security situation in Portugal is no better or worse than other countries in the EU and the rest of the world. We commend Portugal for engaging with OWASP to start the process of engaging with these issues, and believe that Portugal has a very strong opportunity to be a leader in this critical area of IT.  We apologize for any difficulty that the article may have caused. &lt;br /&gt;
 &lt;br /&gt;
Jeff Williams&lt;br /&gt;
OWASP Board Member&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*[http://www.sic.aeiou.pt/online/noticias/vida/Especialistas+alertam+para+falhas+na+seguranca+de+aplicacoes+dos+sites+portugueses.htm SIC Online]&lt;br /&gt;
*[http://www.tvi24.iol.pt/tecnologia/internet-sites-hackers-tvi24/1231818-4069.html TVI Online]&lt;br /&gt;
*[http://sol.sapo.pt/inicio/Tecnologia/Interior.aspx?content_id=11262 Semanário SOL]&lt;br /&gt;
*[http://economico.sapo.pt/noticias/hackers-profissionais-alertam-para-falhas-na-seguranca-dos-sites-portugueses_110708.html Diário Económico]&lt;br /&gt;
*[http://www.ionline.pt/conteudo/103526-hackers-profissionais-alertam-falhas-na-seguranca-nos-sites-portugueses I Online]&lt;br /&gt;
*[http://noticias.sapo.pt/tecnologia/ Tecnologia Sapo]&lt;br /&gt;
*[http://www.jn.pt/PaginaInicial/Tecnologia/Interior.aspx?content_id=1779281 Jornal de Notícias]&lt;br /&gt;
*[http://diario.iol.pt/noticia.html?id=1231816&amp;amp;div_id=4058 Diário IOL]&lt;br /&gt;
*[http://www.correiodominho.com/noticias.php?id=42900 Correio do Minho]&lt;br /&gt;
*[http://net.invirtus.net/?p=4763 Net Invirtus]&lt;br /&gt;
*[http://www.websegura.net/2011/02/hackers-profissionais-alertam-para-falhas-na-seguranca-dos-sites-portugueses/ Websegura]&lt;br /&gt;
*[http://www.dnoticias.pt/actualidade/mundo/249085-hackers-profissionais-alertam-para-vulnerabilidade-dos-sites-portugueses D Notícias]&lt;br /&gt;
&lt;br /&gt;
*[http://search.twitter.com/search?q=OWASP+Summit Twitter]&lt;br /&gt;
*[http://www.linkedin.com/osview/canvas?_ch_page_id=1&amp;amp;_ch_panel_id=1&amp;amp;_ch_app_id=7083120&amp;amp;_applicationId=2000&amp;amp;_ownerId=0&amp;amp;appParams={%22go_to%22:%22events/511663%22,%22referrer%22:%22public%22} Linkedin]&lt;br /&gt;
*[http://www.portable-digital-video-recorder.com/owasp-world-summit-2011/ www.portable-digital-video-recorder.com]&lt;br /&gt;
*[http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6636.msg35608/topicseen,1/ www.ethicalhacker.net]&lt;br /&gt;
*[http://tek.sapo.pt/opiniao/muitos_sistemas_das_empresas_sao_colocados_e_1127314.html Tek Sapo]&lt;br /&gt;
*[http://www.fibra.pt/index.php?option=com_content&amp;amp;view=article&amp;amp;id=807:especialistas-mundiais-discutem-em-portugal-seguranca-na-internet&amp;amp;catid=35:internet&amp;amp;Itemid=59 Fibra]&lt;br /&gt;
*[http://www.bit.pt/ Bit]&lt;br /&gt;
*[http://noticias.comunidade.com.pt/noticia.asp?id=113236&amp;amp;t=OWASP-Summit-2011 Comunidade]&lt;br /&gt;
*[http://tek.sapo.pt/extras/site_do_dia/seguranca_em_primeiro_lugar_1126147.html Tek Sapo]&lt;br /&gt;
*[http://www.securityvibes.com/community/en/blog/2011/02/03/owasp-draws-up-xss-battle-plan Security Vibes]&lt;br /&gt;
*[http://blog.carlosserrao.net/owasp-summit-2011-here-i-go Carlos Serrão's Blog]&lt;br /&gt;
*[http://owasp.blogspot.com/2011/01/owasp-summit-js-challenge.html OWASP Summit JS Challenge]&lt;br /&gt;
*[http://www.malwarecity.com/community/index.php?app=blog&amp;amp;module=display&amp;amp;section=blog&amp;amp;blogid=23&amp;amp;showentry=3984 www.malwarecity.com]&lt;br /&gt;
*[http://diniscruz.blogspot.com/2011/02/participate-remotely-on-owasp-summit.html Dinis Cruz's Blog]&lt;br /&gt;
*[http://www.clerkendweller.com Clerkendweller Blog]: [http://www.clerkendweller.com/2010/12/24/Smartphone-Security here], [http://www.clerkendweller.com/2011/1/11/Zero-Harm-from-Applications here] and [http://www.clerkendweller.com/2011/2/7/OWASP-Application-Security-Summit-2011 here]&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104811</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104811"/>
				<updated>2011-02-10T12:29:03Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = 099&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session077|'''Global Conferences Committee Monthly Meeting''']] - Lusitano Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session264|'''Planning South America/Central America AppSec''']] - Game Room &amp;lt;br&amp;gt;&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = &lt;br /&gt;
| VillaE_Number = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Friday, Feb 11  ====&lt;br /&gt;
The Friday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Friday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Thursday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 14h00 - 15h00&lt;br /&gt;
| EventName = '''Closing Session''' &amp;lt;br&amp;gt; Campo Real I Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104809</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104809"/>
				<updated>2011-02-10T12:13:23Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = 099&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session077|'''Global Conferences Committee Monthly Meeting''']] - Lusitano Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session264|'''Planning South America/Central America AppSec''']] - Game Room &amp;lt;br&amp;gt;&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = 264&lt;br /&gt;
| VillaE_Number = 958&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Friday, Feb 11  ====&lt;br /&gt;
The Friday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Friday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Thursday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 14h00 - 15h00&lt;br /&gt;
| EventName = '''Closing Session''' &amp;lt;br&amp;gt; Campo Real I Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session252&amp;diff=104808</id>
		<title>Summit 2011 Working Sessions/Session252</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session252&amp;diff=104808"/>
				<updated>2011-02-10T12:10:32Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = &lt;br /&gt;
| summit_session_attendee_email1 = &lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = &lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = &lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5= &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6= &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7= &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8= &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9= &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10= &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11= &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12= &lt;br /&gt;
| summit_session_attendee_company12 =&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14= &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15= &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16= &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17= &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18= &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19= &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20= &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._secure_coding.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._secure_coding.jpg]]&lt;br /&gt;
| summit_session_name = ESAPI framework integration&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session252&lt;br /&gt;
| mailing_list =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Jeff Williams&lt;br /&gt;
| summit_session_leader_email1 = jeff.williams@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = &lt;br /&gt;
| operational_leader_email1 = &lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session252&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session252&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104807</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104807"/>
				<updated>2011-02-10T12:08:57Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = 099&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session077|'''Global Conferences Committee Monthly Meeting''']] - Lusitano Room &amp;lt;br&amp;gt;&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = 264&lt;br /&gt;
| VillaE_Number = 958&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Friday, Feb 11  ====&lt;br /&gt;
The Friday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Friday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Thursday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = &lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 14h00 - 15h00&lt;br /&gt;
| EventName = '''Closing Session''' &amp;lt;br&amp;gt; Campo Real I Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104806</id>
		<title>Summit 2011/Media</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104806"/>
				<updated>2011-02-10T12:00:06Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Press Releases ===&lt;br /&gt;
* January, 28, 2011 - [http://www.owasp.org/images/d/db/Comunicado_OWASP_280110.pdf Portuguese] and [http://www.owasp.org/images/9/97/Pressrelease_OWASP_280110.pdf English] Versions.&lt;br /&gt;
&lt;br /&gt;
=== Media Mentions ===&lt;br /&gt;
*[http://search.twitter.com/search?q=OWASP+Summit Twitter]&lt;br /&gt;
*[http://www.linkedin.com/osview/canvas?_ch_page_id=1&amp;amp;_ch_panel_id=1&amp;amp;_ch_app_id=7083120&amp;amp;_applicationId=2000&amp;amp;_ownerId=0&amp;amp;appParams={%22go_to%22:%22events/511663%22,%22referrer%22:%22public%22} Linkedin]&lt;br /&gt;
*[http://www.portable-digital-video-recorder.com/owasp-world-summit-2011/ www.portable-digital-video-recorder.com]&lt;br /&gt;
*[http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6636.msg35608/topicseen,1/ www.ethicalhacker.net]&lt;br /&gt;
*[http://tek.sapo.pt/opiniao/muitos_sistemas_das_empresas_sao_colocados_e_1127314.html Tek Sapo]&lt;br /&gt;
*[http://www.fibra.pt/index.php?option=com_content&amp;amp;view=article&amp;amp;id=807:especialistas-mundiais-discutem-em-portugal-seguranca-na-internet&amp;amp;catid=35:internet&amp;amp;Itemid=59 Fibra]&lt;br /&gt;
*[http://www.bit.pt/ Bit]&lt;br /&gt;
*[http://noticias.comunidade.com.pt/noticia.asp?id=113236&amp;amp;t=OWASP-Summit-2011 Comunidade]&lt;br /&gt;
*[http://tek.sapo.pt/extras/site_do_dia/seguranca_em_primeiro_lugar_1126147.html Tek Sapo]&lt;br /&gt;
*[http://www.securityvibes.com/community/en/blog/2011/02/03/owasp-draws-up-xss-battle-plan Security Vibes]&lt;br /&gt;
*[http://blog.carlosserrao.net/owasp-summit-2011-here-i-go Carlos Serrão's Blog]&lt;br /&gt;
*[http://owasp.blogspot.com/2011/01/owasp-summit-js-challenge.html OWASP Summit JS Challenge]&lt;br /&gt;
*[http://www.malwarecity.com/community/index.php?app=blog&amp;amp;module=display&amp;amp;section=blog&amp;amp;blogid=23&amp;amp;showentry=3984 www.malwarecity.com]&lt;br /&gt;
*[http://diniscruz.blogspot.com/2011/02/participate-remotely-on-owasp-summit.html Dinis Cruz's Blog]&lt;br /&gt;
*[http://www.clerkendweller.com Clerkendweller Blog]: [http://www.clerkendweller.com/2010/12/24/Smartphone-Security here], [http://www.clerkendweller.com/2011/1/11/Zero-Harm-from-Applications here] and [http://www.clerkendweller.com/2011/2/7/OWASP-Application-Security-Summit-2011 here]&lt;br /&gt;
&lt;br /&gt;
'''Mensagem de Jeff Williams, Membro da Board da Fundação OWASP''' (Portuguese)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Na sequência da notícia “Especialistas alertam para falhas na segurança de sites portugueses”, publicada a 7 de Fevereiro pela Agência Lusa, a OWASP esclarece que a actual situação de Portugal não é diferente da de outros países da União Europeia.  Aliás, é de enaltecer  o envolvimento de Portugal com a OWASP no sentido de iniciar o processo de abordagem à segurança aplicacional e acreditamos que Portugal tem a oportunidade e a capacidade para liderar esta área critica das Tecnologias da Informação.&lt;br /&gt;
Queremos, com este email, salientar que as declarações feitas pelos elementos da OWASP, no âmbito da realização do referido artigo, tinham um objectivo de sensibilização e não o de causar nenhum tipo de equívoco ou dúvida relativamente à situação portuguesa.&lt;br /&gt;
Neste contexto, e se considerarem relevante, agradecemos à Agência Lusa o favor de divulgar este esclarecimento.&lt;br /&gt;
Cumprimentos,&lt;br /&gt;
 &lt;br /&gt;
Jeff Williams&lt;br /&gt;
OWASP Board Member&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Message of Jeff Williams, OWASP Board Member''' (English)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP requests a clarification on the article, “Especialistas alertam para falhas na segurança de sites portugueses” published on the 7th of February. We wish to make it absolutely clear that the application security situation in Portugal is no better or worse than other countries in the EU and the rest of the world. We commend Portugal for engaging with OWASP to start the process of engaging with these issues, and believe that Portugal has a very strong opportunity to be a leader in this critical area of IT.  We apologize for any difficulty that the article may have caused. &lt;br /&gt;
 &lt;br /&gt;
Jeff Williams&lt;br /&gt;
OWASP Board Member&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*[http://www.sic.aeiou.pt/online/noticias/vida/Especialistas+alertam+para+falhas+na+seguranca+de+aplicacoes+dos+sites+portugueses.htm SIC Online]&lt;br /&gt;
*[http://www.tvi24.iol.pt/tecnologia/internet-sites-hackers-tvi24/1231818-4069.html TVI Online]&lt;br /&gt;
*[http://sol.sapo.pt/inicio/Tecnologia/Interior.aspx?content_id=11262 Semanário SOL]&lt;br /&gt;
*[http://economico.sapo.pt/noticias/hackers-profissionais-alertam-para-falhas-na-seguranca-dos-sites-portugueses_110708.html Diário Económico]&lt;br /&gt;
*[http://www.ionline.pt/conteudo/103526-hackers-profissionais-alertam-falhas-na-seguranca-nos-sites-portugueses I Online]&lt;br /&gt;
*[http://noticias.sapo.pt/tecnologia/ Tecnologia Sapo]&lt;br /&gt;
*[http://www.jn.pt/PaginaInicial/Tecnologia/Interior.aspx?content_id=1779281 Jornal de Notícias]&lt;br /&gt;
*[http://diario.iol.pt/noticia.html?id=1231816&amp;amp;div_id=4058 Diário IOL]&lt;br /&gt;
*[http://www.correiodominho.com/noticias.php?id=42900 Correio do Minho]&lt;br /&gt;
*[http://net.invirtus.net/?p=4763 Net Invirtus]&lt;br /&gt;
*[http://www.websegura.net/2011/02/hackers-profissionais-alertam-para-falhas-na-seguranca-dos-sites-portugueses/ Websegura]&lt;br /&gt;
*[http://www.dnoticias.pt/actualidade/mundo/249085-hackers-profissionais-alertam-para-vulnerabilidade-dos-sites-portugueses D Notícias]&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104805</id>
		<title>Summit 2011/Media</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104805"/>
				<updated>2011-02-10T11:59:09Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Press Releases ===&lt;br /&gt;
* January, 28, 2011 - [http://www.owasp.org/images/d/db/Comunicado_OWASP_280110.pdf Portuguese] and [http://www.owasp.org/images/9/97/Pressrelease_OWASP_280110.pdf English] Versions.&lt;br /&gt;
&lt;br /&gt;
=== Media Mentions ===&lt;br /&gt;
*[http://search.twitter.com/search?q=OWASP+Summit Twitter]&lt;br /&gt;
*[http://www.linkedin.com/osview/canvas?_ch_page_id=1&amp;amp;_ch_panel_id=1&amp;amp;_ch_app_id=7083120&amp;amp;_applicationId=2000&amp;amp;_ownerId=0&amp;amp;appParams={%22go_to%22:%22events/511663%22,%22referrer%22:%22public%22} Linkedin]&lt;br /&gt;
*[http://www.portable-digital-video-recorder.com/owasp-world-summit-2011/ www.portable-digital-video-recorder.com]&lt;br /&gt;
*[http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6636.msg35608/topicseen,1/ www.ethicalhacker.net]&lt;br /&gt;
*[http://tek.sapo.pt/opiniao/muitos_sistemas_das_empresas_sao_colocados_e_1127314.html Tek Sapo]&lt;br /&gt;
*[http://www.fibra.pt/index.php?option=com_content&amp;amp;view=article&amp;amp;id=807:especialistas-mundiais-discutem-em-portugal-seguranca-na-internet&amp;amp;catid=35:internet&amp;amp;Itemid=59 Fibra]&lt;br /&gt;
*[http://www.bit.pt/ Bit]&lt;br /&gt;
*[http://noticias.comunidade.com.pt/noticia.asp?id=113236&amp;amp;t=OWASP-Summit-2011 Comunidade]&lt;br /&gt;
*[http://tek.sapo.pt/extras/site_do_dia/seguranca_em_primeiro_lugar_1126147.html Tek Sapo]&lt;br /&gt;
*[http://www.securityvibes.com/community/en/blog/2011/02/03/owasp-draws-up-xss-battle-plan Security Vibes]&lt;br /&gt;
*[http://blog.carlosserrao.net/owasp-summit-2011-here-i-go Carlos Serrão's Blog]&lt;br /&gt;
*[http://owasp.blogspot.com/2011/01/owasp-summit-js-challenge.html OWASP Summit JS Challenge]&lt;br /&gt;
*[http://www.malwarecity.com/community/index.php?app=blog&amp;amp;module=display&amp;amp;section=blog&amp;amp;blogid=23&amp;amp;showentry=3984 www.malwarecity.com]&lt;br /&gt;
*[http://diniscruz.blogspot.com/2011/02/participate-remotely-on-owasp-summit.html Dinis Cruz's Blog]&lt;br /&gt;
*[http://www.clerkendweller.com Clerkendweller Blog]: [http://www.clerkendweller.com/2010/12/24/Smartphone-Security here], [http://www.clerkendweller.com/2011/1/11/Zero-Harm-from-Applications here] and [http://www.clerkendweller.com/2011/2/7/OWASP-Application-Security-Summit-2011 here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mensagem de Jeff Williams, Membro da Board da Fundação OWASP''' (Portuguese)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Na sequência da notícia “Especialistas alertam para falhas na segurança de sites portugueses”, publicada a 7 de Fevereiro pela Agência Lusa, a OWASP esclarece que a actual situação de Portugal não é diferente da de outros países da União Europeia.  Aliás, é de enaltecer  o envolvimento de Portugal com a OWASP no sentido de iniciar o processo de abordagem à segurança aplicacional e acreditamos que Portugal tem a oportunidade e a capacidade para liderar esta área critica das Tecnologias da Informação.&lt;br /&gt;
Queremos, com este email, salientar que as declarações feitas pelos elementos da OWASP, no âmbito da realização do referido artigo, tinham um objectivo de sensibilização e não o de causar nenhum tipo de equívoco ou dúvida relativamente à situação portuguesa.&lt;br /&gt;
Neste contexto, e se considerarem relevante, agradecemos à Agência Lusa o favor de divulgar este esclarecimento.&lt;br /&gt;
Cumprimentos,&lt;br /&gt;
 &lt;br /&gt;
Jeff Williams&lt;br /&gt;
OWASP Board Member&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Message of Jeff Williams, OWASP Board Member''' (English)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP requests a clarification on the article, “Especialistas alertam para falhas na segurança de sites portugueses” published on the 7th of February. We wish to make it absolutely clear that the application security situation in Portugal is no better or worse than other countries in the EU and the rest of the world. We commend Portugal for engaging with OWASP to start the process of engaging with these issues, and believe that Portugal has a very strong opportunity to be a leader in this critical area of IT.  We apologize for any difficulty that the article may have caused. &lt;br /&gt;
 &lt;br /&gt;
Jeff Williams&lt;br /&gt;
OWASP Board Member&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[http://www.sic.aeiou.pt/online/noticias/vida/Especialistas+alertam+para+falhas+na+seguranca+de+aplicacoes+dos+sites+portugueses.htm SIC Online]&lt;br /&gt;
*[http://www.tvi24.iol.pt/tecnologia/internet-sites-hackers-tvi24/1231818-4069.html TVI Online]&lt;br /&gt;
*[http://sol.sapo.pt/inicio/Tecnologia/Interior.aspx?content_id=11262 Semanário SOL]&lt;br /&gt;
*[http://economico.sapo.pt/noticias/hackers-profissionais-alertam-para-falhas-na-seguranca-dos-sites-portugueses_110708.html Diário Económico]&lt;br /&gt;
*[http://www.ionline.pt/conteudo/103526-hackers-profissionais-alertam-falhas-na-seguranca-nos-sites-portugueses I Online]&lt;br /&gt;
*[http://noticias.sapo.pt/tecnologia/ Tecnologia Sapo]&lt;br /&gt;
*[http://www.jn.pt/PaginaInicial/Tecnologia/Interior.aspx?content_id=1779281 Jornal de Notícias]&lt;br /&gt;
*[http://diario.iol.pt/noticia.html?id=1231816&amp;amp;div_id=4058 Diário IOL]&lt;br /&gt;
*[http://www.correiodominho.com/noticias.php?id=42900 Correio do Minho]&lt;br /&gt;
*[http://net.invirtus.net/?p=4763 Net Invirtus]&lt;br /&gt;
*[http://www.websegura.net/2011/02/hackers-profissionais-alertam-para-falhas-na-seguranca-dos-sites-portugueses/ Websegura]&lt;br /&gt;
*[http://www.dnoticias.pt/actualidade/mundo/249085-hackers-profissionais-alertam-para-vulnerabilidade-dos-sites-portugueses D Notícias]&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077&amp;diff=104804</id>
		<title>Summit 2011 Working Sessions/Session077</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077&amp;diff=104804"/>
				<updated>2011-02-10T11:28:15Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Matthew Chalmers&lt;br /&gt;
| summit_session_attendee_email1 = matthew.chalmers@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=[http://www.rockwellautomation.com/ http://www.rockwellautomation.com/lib/images/ralogo_web.gif]&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Dinis Cruz&lt;br /&gt;
| summit_session_attendee_email2 = dinis.cruz@owasp.org&lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Mark Bristow&lt;br /&gt;
| summit_session_attendee_email3 = mark.bristow@owasp.org&lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3= Securicon LLC&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Doug Wilson&lt;br /&gt;
| summit_session_attendee_email4 = dougDOTwilsonATowaspDOTorg&lt;br /&gt;
| summit_session_attendee_username4 = Dallendoug&lt;br /&gt;
| summit_session_attendee_company4= [http://www.mandiant.com Mandiant]&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= Concern about balancing growth of OWASP with evolutionary requirements. Most organizations fail to manage their growth, would like to see OWASP not go the same way.&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Martin Knobloch&lt;br /&gt;
| summit_session_attendee_email5 = martin.knobloch@owasp.org&lt;br /&gt;
| summit_session_attendee_username5 = knoblochmartin&lt;br /&gt;
| summit_session_attendee_company5= PervaSec&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._owasp.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._owasp.jpg]]&lt;br /&gt;
| summit_session_name = OWASP funding and CEO discussion&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session077&lt;br /&gt;
| mailing_list =&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= The Summit has been a great opportunity for establishing contacts and relationships with representatives of the corporate world. This session aims to review the current OWASP funding model and start discussing ways of creating synergies with companies and originate new opportunities of funding for OWASP. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This session will also serve as a lead in to additional discussions around the organizational model and set a baseline for the topic of what professional roles should ixist inside the OWASP organization, including the proposal for the role of a CEO.&lt;br /&gt;
&lt;br /&gt;
See the [[Talk:Summit_2011_Working_Sessions/Session077|'''Discussion''']] page for Arguments for and against OWASP Hiring a CEO&lt;br /&gt;
&lt;br /&gt;
PowerPoint presentation [http://www.owasp.org/index.php/File:Summit_Funding_session.pptx '''HERE''']&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = For information related to the CEO discussion please see the '''[[Talk:Summit 2011 Working Sessions/Session077|Discussion]]''' page.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = A process for gathering and addressing suggestions for new OWASP funding opportunities.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = A recommendation on whether or not the investment in a CEO would be cost-effective.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Keith Turpin&lt;br /&gt;
| summit_session_leader_email1 = keith.turpin@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = Keith_Turpin&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session077&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session077&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077&amp;diff=104803</id>
		<title>Summit 2011 Working Sessions/Session077</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077&amp;diff=104803"/>
				<updated>2011-02-10T11:26:56Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Matthew Chalmers&lt;br /&gt;
| summit_session_attendee_email1 = matthew.chalmers@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=[http://www.rockwellautomation.com/ http://www.rockwellautomation.com/lib/images/ralogo_web.gif]&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Dinis Cruz&lt;br /&gt;
| summit_session_attendee_email2 = dinis.cruz@owasp.org&lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Mark Bristow&lt;br /&gt;
| summit_session_attendee_email3 = mark.bristow@owasp.org&lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3= Securicon LLC&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Doug Wilson&lt;br /&gt;
| summit_session_attendee_email4 = dougDOTwilsonATowaspDOTorg&lt;br /&gt;
| summit_session_attendee_username4 = Dallendoug&lt;br /&gt;
| summit_session_attendee_company4= [http://www.mandiant.com Mandiant]&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= Concern about balancing growth of OWASP with evolutionary requirements. Most organizations fail to manage their growth, would like to see OWASP not go the same way.&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Martin Knobloch&lt;br /&gt;
| summit_session_attendee_email5 = martin.knobloch@owasp.org&lt;br /&gt;
| summit_session_attendee_username5 = knoblochmartin&lt;br /&gt;
| summit_session_attendee_company5= PervaSec&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._owasp.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._owasp.jpg]]&lt;br /&gt;
| summit_session_name = OWASP funding and CEO discussion&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session077&lt;br /&gt;
| mailing_list =&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= The Summit has been a great opportunity for establishing contacts and relationships with representatives of the corporate world. This session aims to review the current OWASP funding model and start discussing ways of creating synergies with companies and originate new opportunities of funding for OWASP. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This session will also serve as a lead in to additional discussions around the organizational model and set a baseline for the topic of what professional roles should ixist inside the OWASP organization, including the proposal for the role of a CEO.&lt;br /&gt;
&lt;br /&gt;
See the [[Talk:Summit_2011_Working_Sessions/Session077|'''Discussion''']] page for Arguments for and against OWASP Hiring a CEO&lt;br /&gt;
&lt;br /&gt;
PowerPoint presentation [[File:Summit Funding session.pptx|'''HERE''']]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = For information related to the CEO discussion please see the '''[[Talk:Summit 2011 Working Sessions/Session077|Discussion]]''' page.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = A process for gathering and addressing suggestions for new OWASP funding opportunities.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = A recommendation on whether or not the investment in a CEO would be cost-effective.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Keith Turpin&lt;br /&gt;
| summit_session_leader_email1 = keith.turpin@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = Keith_Turpin&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session077&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session077&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_Funding_session.pptx&amp;diff=104802</id>
		<title>File:Summit Funding session.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_Funding_session.pptx&amp;diff=104802"/>
				<updated>2011-02-10T11:25:19Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104801</id>
		<title>Summit 2011/Media</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104801"/>
				<updated>2011-02-10T11:23:05Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Press Releases ===&lt;br /&gt;
* January, 28, 2011 - [http://www.owasp.org/images/d/db/Comunicado_OWASP_280110.pdf Portuguese] and [http://www.owasp.org/images/9/97/Pressrelease_OWASP_280110.pdf English] Versions.&lt;br /&gt;
&lt;br /&gt;
=== Media Mentions ===&lt;br /&gt;
*[http://search.twitter.com/search?q=OWASP+Summit Twitter]&lt;br /&gt;
*[http://www.linkedin.com/osview/canvas?_ch_page_id=1&amp;amp;_ch_panel_id=1&amp;amp;_ch_app_id=7083120&amp;amp;_applicationId=2000&amp;amp;_ownerId=0&amp;amp;appParams={%22go_to%22:%22events/511663%22,%22referrer%22:%22public%22} Linkedin]&lt;br /&gt;
*[http://www.portable-digital-video-recorder.com/owasp-world-summit-2011/ www.portable-digital-video-recorder.com]&lt;br /&gt;
*[http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6636.msg35608/topicseen,1/ www.ethicalhacker.net]&lt;br /&gt;
*[http://tek.sapo.pt/opiniao/muitos_sistemas_das_empresas_sao_colocados_e_1127314.html Tek Sapo]&lt;br /&gt;
*[http://www.fibra.pt/index.php?option=com_content&amp;amp;view=article&amp;amp;id=807:especialistas-mundiais-discutem-em-portugal-seguranca-na-internet&amp;amp;catid=35:internet&amp;amp;Itemid=59 Fibra]&lt;br /&gt;
*[http://www.bit.pt/ Bit]&lt;br /&gt;
*[http://noticias.comunidade.com.pt/noticia.asp?id=113236&amp;amp;t=OWASP-Summit-2011 Comunidade]&lt;br /&gt;
*[http://tek.sapo.pt/extras/site_do_dia/seguranca_em_primeiro_lugar_1126147.html Tek Sapo]&lt;br /&gt;
*[http://www.securityvibes.com/community/en/blog/2011/02/03/owasp-draws-up-xss-battle-plan Security Vibes]&lt;br /&gt;
*[http://blog.carlosserrao.net/owasp-summit-2011-here-i-go Carlos Serrão's Blog]&lt;br /&gt;
*[http://owasp.blogspot.com/2011/01/owasp-summit-js-challenge.html OWASP Summit JS Challenge]&lt;br /&gt;
*[http://www.malwarecity.com/community/index.php?app=blog&amp;amp;module=display&amp;amp;section=blog&amp;amp;blogid=23&amp;amp;showentry=3984 www.malwarecity.com]&lt;br /&gt;
*[http://diniscruz.blogspot.com/2011/02/participate-remotely-on-owasp-summit.html Dinis Cruz's Blog]&lt;br /&gt;
*[http://www.clerkendweller.com Clerkendweller Blog]: [http://www.clerkendweller.com/2010/12/24/Smartphone-Security here], [http://www.clerkendweller.com/2011/1/11/Zero-Harm-from-Applications here] and [http://www.clerkendweller.com/2011/2/7/OWASP-Application-Security-Summit-2011 here]&lt;br /&gt;
&lt;br /&gt;
*[http://www.sic.aeiou.pt/online/noticias/vida/Especialistas+alertam+para+falhas+na+seguranca+de+aplicacoes+dos+sites+portugueses.htm SIC Online]&lt;br /&gt;
*[http://www.tvi24.iol.pt/tecnologia/internet-sites-hackers-tvi24/1231818-4069.html TVI Online]&lt;br /&gt;
*[http://sol.sapo.pt/inicio/Tecnologia/Interior.aspx?content_id=11262 Semanário SOL]&lt;br /&gt;
*[http://economico.sapo.pt/noticias/hackers-profissionais-alertam-para-falhas-na-seguranca-dos-sites-portugueses_110708.html Diário Económico]&lt;br /&gt;
*[http://www.ionline.pt/conteudo/103526-hackers-profissionais-alertam-falhas-na-seguranca-nos-sites-portugueses I Online]&lt;br /&gt;
*[http://noticias.sapo.pt/tecnologia/ Tecnologia Sapo]&lt;br /&gt;
*[http://www.jn.pt/PaginaInicial/Tecnologia/Interior.aspx?content_id=1779281 Jornal de Notícias]&lt;br /&gt;
*[http://diario.iol.pt/noticia.html?id=1231816&amp;amp;div_id=4058 Diário IOL]&lt;br /&gt;
*[http://www.correiodominho.com/noticias.php?id=42900 Correio do Minho]&lt;br /&gt;
*[http://net.invirtus.net/?p=4763 Net Invirtus]&lt;br /&gt;
*[http://www.websegura.net/2011/02/hackers-profissionais-alertam-para-falhas-na-seguranca-dos-sites-portugueses/ Websegura]&lt;br /&gt;
*[http://www.dnoticias.pt/actualidade/mundo/249085-hackers-profissionais-alertam-para-vulnerabilidade-dos-sites-portugueses D Notícias]&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104800</id>
		<title>Summit 2011/Media</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011/Media&amp;diff=104800"/>
				<updated>2011-02-10T11:13:48Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Press Releases ===&lt;br /&gt;
* January, 28, 2011 - [http://www.owasp.org/images/d/db/Comunicado_OWASP_280110.pdf Portuguese] and [http://www.owasp.org/images/9/97/Pressrelease_OWASP_280110.pdf English] Versions.&lt;br /&gt;
&lt;br /&gt;
=== Media Mentions ===&lt;br /&gt;
*[http://search.twitter.com/search?q=OWASP+Summit Twitter]&lt;br /&gt;
*[http://www.linkedin.com/osview/canvas?_ch_page_id=1&amp;amp;_ch_panel_id=1&amp;amp;_ch_app_id=7083120&amp;amp;_applicationId=2000&amp;amp;_ownerId=0&amp;amp;appParams={%22go_to%22:%22events/511663%22,%22referrer%22:%22public%22} Linkedin]&lt;br /&gt;
*[http://www.portable-digital-video-recorder.com/owasp-world-summit-2011/ www.portable-digital-video-recorder.com]&lt;br /&gt;
*[http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6636.msg35608/topicseen,1/ www.ethicalhacker.net]&lt;br /&gt;
*[http://tek.sapo.pt/opiniao/muitos_sistemas_das_empresas_sao_colocados_e_1127314.html Tek Sapo]&lt;br /&gt;
*[http://www.fibra.pt/index.php?option=com_content&amp;amp;view=article&amp;amp;id=807:especialistas-mundiais-discutem-em-portugal-seguranca-na-internet&amp;amp;catid=35:internet&amp;amp;Itemid=59 Fibra]&lt;br /&gt;
*[http://www.bit.pt/ Bit]&lt;br /&gt;
*[http://noticias.comunidade.com.pt/noticia.asp?id=113236&amp;amp;t=OWASP-Summit-2011 Comunidade]&lt;br /&gt;
*[http://tek.sapo.pt/extras/site_do_dia/seguranca_em_primeiro_lugar_1126147.html Tek Sapo]&lt;br /&gt;
*[http://www.securityvibes.com/community/en/blog/2011/02/03/owasp-draws-up-xss-battle-plan Security Vibes]&lt;br /&gt;
*[http://blog.carlosserrao.net/owasp-summit-2011-here-i-go Carlos Serrão's Blog]&lt;br /&gt;
*[http://owasp.blogspot.com/2011/01/owasp-summit-js-challenge.html OWASP Summit JS Challenge]&lt;br /&gt;
*[http://www.malwarecity.com/community/index.php?app=blog&amp;amp;module=display&amp;amp;section=blog&amp;amp;blogid=23&amp;amp;showentry=3984 www.malwarecity.com]&lt;br /&gt;
*[http://diniscruz.blogspot.com/2011/02/participate-remotely-on-owasp-summit.html Dinis Cruz's Blog]&lt;br /&gt;
*[http://www.clerkendweller.com Clerkendweller Blog]: [http://www.clerkendweller.com/2010/12/24/Smartphone-Security here], [http://www.clerkendweller.com/2011/1/11/Zero-Harm-from-Applications here] and [http://www.clerkendweller.com/2011/2/7/OWASP-Application-Security-Summit-2011 here]&lt;br /&gt;
&lt;br /&gt;
*[http://www.sic.aeiou.pt/online/noticias/vida/Especialistas+alertam+para+falhas+na+seguranca+de+aplicacoes+dos+sites+portugueses.htm SIC Online(Television)]&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104799</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104799"/>
				<updated>2011-02-10T10:53:29Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = 099&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session077|'''Global Conferences Committee Monthly Meeting''']] - Lusitano Room &amp;lt;br&amp;gt;&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = 264&lt;br /&gt;
| VillaE_Number = 958&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session264&amp;diff=104798</id>
		<title>Summit 2011 Working Sessions/Session264</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session264&amp;diff=104798"/>
				<updated>2011-02-10T10:52:26Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: Created page with &amp;quot;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;  |-  | summit_session_attendee_name1 =  | summit_session_attendee_email1...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = &lt;br /&gt;
| summit_session_attendee_email1 = &lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = &lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = &lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5= &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6= &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7= &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8= &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9= &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10= &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11= &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12= &lt;br /&gt;
| summit_session_attendee_company12 =&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14= &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15= &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16= &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17= &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18= &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19= &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20= &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._owasp.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._owasp.jpg‎]]&lt;br /&gt;
| summit_session_name = Planning South America/Central America AppSec&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session264&lt;br /&gt;
| mailing_list =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Mateo Martinez&lt;br /&gt;
| summit_session_leader_email1 = mateo.martinez@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = &lt;br /&gt;
| operational_leader_email1 = &lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session264&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session264&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_Tracks&amp;diff=104797</id>
		<title>Category:Summit 2011 Tracks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_Tracks&amp;diff=104797"/>
				<updated>2011-02-10T10:50:15Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;[[Summit_2011 | '''Back to main Summit 2011 page''']]&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
=Introduction=&lt;br /&gt;
Click on the working session name to see the home page for that particular session. During the Summit those working session home pages will be used to document discussions and outcomes.&lt;br /&gt;
&lt;br /&gt;
If you're interested in adding a Working Session for the 2011 Summit, there still is time to start a session! Please review the [[Working Sessions Methodology|Working Session methodology]] for Working Session rules.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._metrics.jpg|link=:Category:Summit_2011_Metrics_Track]] &amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Metrics_Track|Category: Summit 2011 Metrics Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session055 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session056 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session057 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session058 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session059 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session085 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session086 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session256 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Metrics | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._browser_security.jpg|link=:Category:Summit_2011_Browser_Security_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Browser_Security_Track|Category: Summit 2011 Browser Security Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session001 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session002 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session003 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session004 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session005 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session006 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session007 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session008 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session046 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session087 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session0207 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session254 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track:_Browser_Security | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._cross_site.jpg|link=Category:Summit_2011_XSS_Eradication_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_XSS_Eradication_Track|Category: Summit 2011 XSS Eradication Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session009 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session010 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session043 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session044 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session045 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session049 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session038 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Cross-Site Scripting Eradication | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._mitigation.jpg|link=:Category:Summit_2011_Mitigation_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Mitigation_Track|Category: Summit 2011 Mitigation Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session091 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session092 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session093 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session094 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session095 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session096 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session097 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Mitigation | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._university.jpg|link=:Category:Summit_2011_University_Education_Training_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_University_Education_Training_Track|Category: Summit 2011 University Education Training Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session012 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session024 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session040 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session041 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session042 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session069 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session088 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session089 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session039 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session204 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session250 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session255 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session259 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session261 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: University Outreach, Education, and Training | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._secure_coding.jpg|link=:Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track|Category: Summit 2011 OWASP Secure Coding Workshop Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session025 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session026 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session027 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session028 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session029 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session030 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session031 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session033 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session034 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session047 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session252 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP Secure Coding Workshop | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._individual_projects.jpg|link=:Category:Summit_2011_Individual_OWASP_Projects_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Individual_OWASP_Projects_Track |Category: Summit 2011 Individual OWASP Projects Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session063 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session065 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session066 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session067 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session068 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session052 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session053 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session048 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session099 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session200 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session201 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session202 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session203 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session205 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session253 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session257 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session260 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Individual OWASP Projects | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._global_committees.jpg|link=:Category:Summit_2011_OWASP_Governance_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Governance_Track|Category: Summit 2011 OWASP Governance Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session013 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session014 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session015 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session016 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session017 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session018 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session019 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session020 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session071 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session076 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session035 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session037 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session054 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session251 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session262 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session263 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP Governance | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._owasp.jpg|link=:Category:Summit_2011_OWASP_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Track|Category: Summit 2011 OWASP Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session021 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session022 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session023 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session070 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session072 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session073 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session074 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session075 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session060 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session061 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session077 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session078 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session079 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session080 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session082 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session084 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session090 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session036 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session098 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session100 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session101 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session102 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session103 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session104 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session105 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session264 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP | See Track Details]]&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;[[Category:Summit_2011]]&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104794</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104794"/>
				<updated>2011-02-10T10:31:03Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = 099&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session077|'''Global Conferences Committee Monthly Meeting''']] - Lusitano Room &amp;lt;br&amp;gt;&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = &lt;br /&gt;
| VillaE_Number = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_Tracks&amp;diff=104793</id>
		<title>Category:Summit 2011 Tracks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_Tracks&amp;diff=104793"/>
				<updated>2011-02-10T10:28:45Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;[[Summit_2011 | '''Back to main Summit 2011 page''']]&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
=Introduction=&lt;br /&gt;
Click on the working session name to see the home page for that particular session. During the Summit those working session home pages will be used to document discussions and outcomes.&lt;br /&gt;
&lt;br /&gt;
If you're interested in adding a Working Session for the 2011 Summit, there still is time to start a session! Please review the [[Working Sessions Methodology|Working Session methodology]] for Working Session rules.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._metrics.jpg|link=:Category:Summit_2011_Metrics_Track]] &amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Metrics_Track|Category: Summit 2011 Metrics Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session055 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session056 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session057 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session058 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session059 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session085 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session086 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session256 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Metrics | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._browser_security.jpg|link=:Category:Summit_2011_Browser_Security_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Browser_Security_Track|Category: Summit 2011 Browser Security Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session001 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session002 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session003 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session004 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session005 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session006 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session007 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session008 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session046 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session087 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session0207 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session254 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track:_Browser_Security | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._cross_site.jpg|link=Category:Summit_2011_XSS_Eradication_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_XSS_Eradication_Track|Category: Summit 2011 XSS Eradication Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session009 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session010 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session043 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session044 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session045 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session049 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session038 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Cross-Site Scripting Eradication | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._mitigation.jpg|link=:Category:Summit_2011_Mitigation_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Mitigation_Track|Category: Summit 2011 Mitigation Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session091 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session092 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session093 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session094 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session095 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session096 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session097 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Mitigation | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._university.jpg|link=:Category:Summit_2011_University_Education_Training_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_University_Education_Training_Track|Category: Summit 2011 University Education Training Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session012 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session024 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session040 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session041 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session042 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session069 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session088 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session089 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session039 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session204 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session250 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session255 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session259 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session261 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: University Outreach, Education, and Training | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._secure_coding.jpg|link=:Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track|Category: Summit 2011 OWASP Secure Coding Workshop Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session025 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session026 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session027 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session028 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session029 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session030 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session031 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session033 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session034 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session047 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session252 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP Secure Coding Workshop | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._individual_projects.jpg|link=:Category:Summit_2011_Individual_OWASP_Projects_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Individual_OWASP_Projects_Track |Category: Summit 2011 Individual OWASP Projects Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session063 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session065 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session066 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session067 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session068 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session052 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session053 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session048 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session099 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session200 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session201 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session202 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session203 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session205 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session253 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session257 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session260 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Individual OWASP Projects | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._global_committees.jpg|link=:Category:Summit_2011_OWASP_Governance_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Governance_Track|Category: Summit 2011 OWASP Governance Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session013 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session014 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session015 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session016 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session017 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session018 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session019 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session020 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session071 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session076 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session035 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session037 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session054 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session251 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session262 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session263 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP Governance | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._owasp.jpg|link=:Category:Summit_2011_OWASP_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Track|Category: Summit 2011 OWASP Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session021 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session022 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session023 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session070 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session072 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session073 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session074 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session075 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session060 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session061 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session077 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session078 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session079 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session080 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session082 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session084 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session090 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session036 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session098 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session100 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session101 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session102 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session103 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session104 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session105 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP | See Track Details]]&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;[[Category:Summit_2011]]&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077/Deliverable_2&amp;diff=104792</id>
		<title>Summit 2011 Working Sessions/Session077/Deliverable 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077/Deliverable_2&amp;diff=104792"/>
				<updated>2011-02-10T10:27:05Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: Created page with &amp;quot;== Deliverable 2 ==  '''A recommendation on whether or not the investment in a CEO would be cost-effective.'''   To be filled in.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Deliverable 2 ==&lt;br /&gt;
&lt;br /&gt;
'''A recommendation on whether or not the investment in a CEO would be cost-effective.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To be filled in.&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077&amp;diff=104791</id>
		<title>Summit 2011 Working Sessions/Session077</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077&amp;diff=104791"/>
				<updated>2011-02-10T10:26:29Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Matthew Chalmers&lt;br /&gt;
| summit_session_attendee_email1 = matthew.chalmers@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=[http://www.rockwellautomation.com/ http://www.rockwellautomation.com/lib/images/ralogo_web.gif]&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Dinis Cruz&lt;br /&gt;
| summit_session_attendee_email2 = dinis.cruz@owasp.org&lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Mark Bristow&lt;br /&gt;
| summit_session_attendee_email3 = mark.bristow@owasp.org&lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3= Securicon LLC&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Doug Wilson&lt;br /&gt;
| summit_session_attendee_email4 = dougDOTwilsonATowaspDOTorg&lt;br /&gt;
| summit_session_attendee_username4 = Dallendoug&lt;br /&gt;
| summit_session_attendee_company4= [http://www.mandiant.com Mandiant]&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= Concern about balancing growth of OWASP with evolutionary requirements. Most organizations fail to manage their growth, would like to see OWASP not go the same way.&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Martin Knobloch&lt;br /&gt;
| summit_session_attendee_email5 = martin.knobloch@owasp.org&lt;br /&gt;
| summit_session_attendee_username5 = knoblochmartin&lt;br /&gt;
| summit_session_attendee_company5= PervaSec&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._owasp.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._owasp.jpg]]&lt;br /&gt;
| summit_session_name = OWASP funding and CEO discussion&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session077&lt;br /&gt;
| mailing_list =&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= The Summit has been a great opportunity for establishing contacts and relationships with representatives of the corporate world. This session aims to review the current OWASP funding model and start discussing ways of creating synergies with companies and originate new opportunities of funding for OWASP. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This session will also serve as a lead in to additional discussions around the organizational model and set a baseline for the topic of what professional roles should ixist inside the OWASP organization, including the proposal for the role of a CEO.&lt;br /&gt;
&lt;br /&gt;
See the [[Talk:Summit_2011_Working_Sessions/Session077|'''Discussion''']] page for Arguments for and against OWASP Hiring a CEO&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = For information related to the CEO discussion please see the '''[[Talk:Summit 2011 Working Sessions/Session077|Discussion]]''' page.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = A process for gathering and addressing suggestions for new OWASP funding opportunities.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = A recommendation on whether or not the investment in a CEO would be cost-effective.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Keith Turpin&lt;br /&gt;
| summit_session_leader_email1 = keith.turpin@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = Keith_Turpin&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session077&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session077&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077&amp;diff=104755</id>
		<title>Summit 2011 Working Sessions/Session077</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session077&amp;diff=104755"/>
				<updated>2011-02-09T19:34:02Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Matthew Chalmers&lt;br /&gt;
| summit_session_attendee_email1 = matthew.chalmers@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=[http://www.rockwellautomation.com/ http://www.rockwellautomation.com/lib/images/ralogo_web.gif]&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Dinis Cruz&lt;br /&gt;
| summit_session_attendee_email2 = dinis.cruz@owasp.org&lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Mark Bristow&lt;br /&gt;
| summit_session_attendee_email3 = mark.bristow@owasp.org&lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3= Securicon LLC&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Doug Wilson&lt;br /&gt;
| summit_session_attendee_email4 = dougDOTwilsonATowaspDOTorg&lt;br /&gt;
| summit_session_attendee_username4 = Dallendoug&lt;br /&gt;
| summit_session_attendee_company4= [http://www.mandiant.com Mandiant]&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= Concern about balancing growth of OWASP with evolutionary requirements. Most organizations fail to manage their growth, would like to see OWASP not go the same way.&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Martin Knobloch&lt;br /&gt;
| summit_session_attendee_email5 = martin.knobloch@owasp.org&lt;br /&gt;
| summit_session_attendee_username5 = knoblochmartin&lt;br /&gt;
| summit_session_attendee_company5= PervaSec&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._owasp.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._owasp.jpg]]&lt;br /&gt;
| summit_session_name = OWASP funding and CEO discussion&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session077&lt;br /&gt;
| mailing_list =&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= As OWASP grows, a number of critical decisions needs to be made in terms of where OWASP allocates its limited financial resources. For example should OWASP hire a CEO or should it hire other type of staff? This working session will cover both sides of the question and hopefully reach a conclusion and proposal for OWASP Board vote&lt;br /&gt;
&lt;br /&gt;
See the [[Talk:Summit_2011_Working_Sessions/Session077]] page for Arguments for and against OWASP Hiring a CEO&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = Please see the '''[[Talk:Summit 2011 Working Sessions/Session077|Discussion]]''' page.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = A white paper analyzing the governance structure of OWASP and recommending whether or not the investment in a CEO would be cost-effective.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Keith Turpin&lt;br /&gt;
| summit_session_leader_email1 = keith.turpin@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = Keith_Turpin&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session077&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session077&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104753</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104753"/>
				<updated>2011-02-09T17:44:49Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = 099&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session072|'''Developer Outreach''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = &lt;br /&gt;
| VillaE_Number = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104752</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104752"/>
				<updated>2011-02-09T17:42:12Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = 099&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session263|'''Industry - Banking/Finance''']] - Game Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = &lt;br /&gt;
| VillaE_Number = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session263&amp;diff=104751</id>
		<title>Summit 2011 Working Sessions/Session263</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session263&amp;diff=104751"/>
				<updated>2011-02-09T17:39:42Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: Created page with &amp;quot;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;  |-  | summit_session_attendee_name1 =  | summit_session_attendee_email1...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = &lt;br /&gt;
| summit_session_attendee_email1 = &lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = &lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = &lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5= &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6= &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7= &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8= &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9= &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10= &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11= &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12= &lt;br /&gt;
| summit_session_attendee_company12 =&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14= &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15= &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16= &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17= &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18= &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19= &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20= &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._global_committees.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._global_commitee.jpg‎]]&lt;br /&gt;
| summit_session_name = Industry - Banking/Finance&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session263&lt;br /&gt;
| mailing_list = https://lists.owasp.org/mailman/listinfo/global_industry_committee&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Eoin Keary&lt;br /&gt;
| summit_session_leader_email1 = eoin.keary@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = EoinKeary&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = Colin Watson&lt;br /&gt;
| summit_session_leader_email2 = colin.watson@owasp.org&lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = &lt;br /&gt;
| operational_leader_email1 = &lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session263&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session263&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_Tracks&amp;diff=104750</id>
		<title>Category:Summit 2011 Tracks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_Tracks&amp;diff=104750"/>
				<updated>2011-02-09T17:35:57Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;[[Summit_2011 | '''Back to main Summit 2011 page''']]&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
=Introduction=&lt;br /&gt;
Click on the working session name to see the home page for that particular session. During the Summit those working session home pages will be used to document discussions and outcomes.&lt;br /&gt;
&lt;br /&gt;
If you're interested in adding a Working Session for the 2011 Summit, there still is time to start a session! Please review the [[Working Sessions Methodology|Working Session methodology]] for Working Session rules.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._metrics.jpg|link=:Category:Summit_2011_Metrics_Track]] &amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Metrics_Track|Category: Summit 2011 Metrics Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session055 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session056 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session057 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session058 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session059 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session085 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session086 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session256 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Metrics | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._browser_security.jpg|link=:Category:Summit_2011_Browser_Security_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Browser_Security_Track|Category: Summit 2011 Browser Security Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session001 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session002 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session003 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session004 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session005 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session006 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session007 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session008 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session046 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session087 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session0207 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session254 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track:_Browser_Security | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._cross_site.jpg|link=Category:Summit_2011_XSS_Eradication_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_XSS_Eradication_Track|Category: Summit 2011 XSS Eradication Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session009 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session010 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session043 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session044 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session045 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session049 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session038 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Cross-Site Scripting Eradication | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._mitigation.jpg|link=:Category:Summit_2011_Mitigation_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Mitigation_Track|Category: Summit 2011 Mitigation Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session091 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session092 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session093 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session094 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session095 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session096 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session097 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Mitigation | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._university.jpg|link=:Category:Summit_2011_University_Education_Training_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_University_Education_Training_Track|Category: Summit 2011 University Education Training Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session012 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session024 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session040 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session041 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session042 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session069 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session088 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session089 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session039 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session204 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session250 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session255 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session259 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session261 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: University Outreach, Education, and Training | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._secure_coding.jpg|link=:Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track|Category: Summit 2011 OWASP Secure Coding Workshop Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session025 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session026 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session027 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session028 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session029 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session030 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session031 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session033 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session034 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session047 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session252 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP Secure Coding Workshop | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._individual_projects.jpg|link=:Category:Summit_2011_Individual_OWASP_Projects_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Individual_OWASP_Projects_Track |Category: Summit 2011 Individual OWASP Projects Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session063 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session065 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session066 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session067 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session068 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session052 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session053 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session048 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session099 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session200 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session201 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session202 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session203 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session205 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session253 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session257 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session260 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Individual OWASP Projects | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._global_committees.jpg|link=:Category:Summit_2011_OWASP_Governance_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Governance_Track|Category: Summit 2011 OWASP Governance Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session013 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session014 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session015 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session016 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session017 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session018 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session019 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session020 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session071 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session076 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session035 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session037 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session054 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session251 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session258 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session262 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session263 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP Governance | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._owasp.jpg|link=:Category:Summit_2011_OWASP_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Track|Category: Summit 2011 OWASP Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session021 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session022 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session023 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session070 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session072 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session073 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session074 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session075 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session060 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session061 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session077 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session078 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session079 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session080 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session082 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session084 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session090 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session036 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session098 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session100 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session101 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session102 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session103 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session104 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session105 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP | See Track Details]]&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;[[Category:Summit_2011]]&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104749</id>
		<title>Summit 2011 Schedule Dynamic</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Schedule_Dynamic&amp;diff=104749"/>
				<updated>2011-02-09T17:31:32Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Final summit quarter half.jpg|link=http://www.owasp.org/index.php/Summit_2011_Logo_Explained]] &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[http://www.twitter.com/OWASPSummit http://twitter-badges.s3.amazonaws.com/twitter-a.png]&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Summit 2011/Media|PRESS RELEASES &amp;amp; Media Mentions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[Image:REGISTER NOW SUMMIT 2011.jpg|link=http://www.regonline.com/owasp_global_summit_2011]] &lt;br /&gt;
*[https://spreadsheets.google.com/viewform?formkey=dEptc1BoTVJSQkxBSDhhNHdSaEN1Y3c6MQ If you can't attend in person, register here for remote participation]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Summit&amp;lt;/paypal&amp;gt;  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Summit 2011|Click to return to Summit 2011's main page]] &lt;br /&gt;
&lt;br /&gt;
==== Work Model  ====&lt;br /&gt;
&lt;br /&gt;
'''The Dynamic Working Sessions Model''' &lt;br /&gt;
&lt;br /&gt;
Welcome to the Dynamic Working Sessions world! These will be fluid, informal, exciting and vibrant Working Sessions that will happen throughout the day in different locations and at different times – you can have them as nice discussions over breakfast, round table presentations or heated debates after dinner around a couple of beers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''How will this Model work?''' &lt;br /&gt;
&lt;br /&gt;
You have here &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Working_Sessions_List The list of Dynamic sessions] &lt;br /&gt;
*The list of Dynamic time slots and locations for [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Tuesday.2C_Feb_8 Tuesday], [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Wednesday.2C_Feb_9 Wednesday] and [http://www.owasp.org/index.php/Summit_2011_Schedule_Dynamic#tab=Thursday.2C_Feb_10 Thursday] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Attendee The list of Attendees]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To organize your Dynamic WS you just have to:''' &lt;br /&gt;
&lt;br /&gt;
*Check the list of available time slots and available locations; &lt;br /&gt;
*Check the list of Attendees and identify the ones you would like to have on your session;&lt;br /&gt;
&lt;br /&gt;
Having into account the availability of both time slots and locations and the schedules of your potential attendees, you can make a decision as to when and where your WS will happen. &lt;br /&gt;
&lt;br /&gt;
Once you have that decision, you just have to email [mailto:owaspsummit_schedule@owasp.org Schedule Team] and they will put your WS and respective information online. &amp;lt;br&amp;gt; '''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
Please note that this is a very dynamic process – if, on one hand, we need to make it easy for you to organize WS in a very fluid way, we also need some time to make sure that you will have all the equipment needed. &lt;br /&gt;
&lt;br /&gt;
That is to say that the Dynamic WS will be organized according to this flow: &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;312&amp;quot; height=&amp;quot;131&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | WS happening on &lt;br /&gt;
! bgcolor=&amp;quot;#cccccc&amp;quot; scope=&amp;quot;col&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Info must be sent until&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday afternoon &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 10h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Tuesday, 18h&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Thursday &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;center&amp;quot; bordercolor=&amp;quot;#cccccc&amp;quot; | Wednesday, 18h&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''To attend a dynamic working session:''' &lt;br /&gt;
&lt;br /&gt;
Check the online Dynamic Shedule of the following day and sign up for the ones you are interested in attending! &lt;br /&gt;
&lt;br /&gt;
'''Note''' – Dynamic sessions will start Tuesday afternoon. If you would like to attend some of these, please make sure you register during the morning. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Working Sessions List  ====&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session018 Chapters: The OWASP 2011 Chapter Plan] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session063 O2 Platform] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session066 Development Guide] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session067 ASVS Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session053 OWASP Java Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session006 Securing Plugins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session004 Enduser Warnings]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session035 Building the OWASP Brazilian Leaders Group] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session205 OWASP .NET Project] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session202 OWASP Projects Infrastructure] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session203 OWASP Projects Security Bulletins] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session093 How to report known security vulnerabilities (for websites)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session069 OWASP TOP 10 online training in Hacking-Lab] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042 Developer's Security Training Package] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session204 OWASP Appsec Tutorial Series] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session017 Connections] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session024 Computer Crime Laws] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session020 Conferences - Improving Conference Planner Support] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session019 Education] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session016 Membership] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session072 Developer Outreach] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session082 How can OWASP reach/talk/engage with auditors] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session092 Scaling Web Application Security Testing] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session031 The Future of the OWASP Secure Coding Workshop] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session088 How to present worldwide David Rice's Pollution keynote] &lt;br /&gt;
*[http://www.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session037 Global Conferences Committee Monthly Meeting] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session086 Creating a unified &amp;quot;finding&amp;quot;] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session075 S is for Safety (as well as Security)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session073 Privacy - Personal Data/PII, Legislation and OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session074 Replicating Samy's EU Tour across OWASP] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session060 OWASP Quotes] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session070 Managing the OWASP Brand] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session026 Defining AppSensor Detection Points] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session029 Protecting Against CSRF] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session084 Creating an Application Security Career - For the Average IT/Network Security Practitioner] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session080 Should OWASP work directly with PCI-DSS?] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session079 Investment justification for Web Application Security] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session078 Less preaching to the choir, engage more with the outsiders] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session061 Did OWASP Failed to achieve its full potential? (and lessons learned)] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session021 OWASP Around the World] &lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session059 Measuring SDLC process performance]&lt;br /&gt;
*[http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session0207 Demo JavaScript Sandboxing + How do we roll out Site Security Policy?]&lt;br /&gt;
&lt;br /&gt;
==== Tuesday, Feb 8  ====&lt;br /&gt;
The Tuesday Dynamic Sessions start at 14h15.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Tuesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 10h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h15 - 15h30&lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 098&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 035&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 085&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 013&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 009&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 250&lt;br /&gt;
| VillaC_Number = 965&lt;br /&gt;
| VillaD               = &lt;br /&gt;
| VillaD_Number = &lt;br /&gt;
| VillaE               = 254&lt;br /&gt;
| VillaE_Number = 968&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Wednesday, Feb 9  ====&lt;br /&gt;
The Wednesday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Wednesday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Tuesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = &lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 256&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 069&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = &lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &amp;lt;br&amp;gt; [[Summit_2011_Working_Sessions/Session026|'''Defining AppSensor Detection Points''']] - Alentejo Room&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 251&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 066&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 255&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 048&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 067&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 257&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 073&lt;br /&gt;
| VillaA_Number = 933&lt;br /&gt;
| VillaB               = 065&lt;br /&gt;
| VillaB_Number = 968&lt;br /&gt;
| VillaC               = 080&lt;br /&gt;
| VillaC_Number = 956&lt;br /&gt;
| VillaD               = 253&lt;br /&gt;
| VillaD_Number = 957&lt;br /&gt;
| VillaE               = 099&lt;br /&gt;
| VillaE_Number = 945&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
==== Thursday, Feb 10  ====&lt;br /&gt;
The Thursday Dynamic Sessions start at 08h30.&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to schedule a session for Thursday, just  email [mailto:summit2011schedule@owasp.org Schedule Team] by 18h00 Wednesday, and they will put your WS and respective information online.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please make sure to include all the following information on the email:''' &lt;br /&gt;
&lt;br /&gt;
*'''Working Session name''' &lt;br /&gt;
*'''Day &amp;amp; Time slot &amp;amp; Location'''&lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Tables/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Tables/Rows &lt;br /&gt;
| Time      = 08h30 - 09h30 &lt;br /&gt;
| TableA    = 082&lt;br /&gt;
| TableB    = &lt;br /&gt;
| TableC    = &lt;br /&gt;
| TableD    = &lt;br /&gt;
| TableE    = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit 2011 Schedule Dynamic/Room C and D/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 10h00 - 11h20 &lt;br /&gt;
| RoomC1  = 259&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 053&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 11h20 - 11h30&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time      = 11h30 - 13h00 &lt;br /&gt;
| RoomC1  = 089&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 262&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 13h00 - 14h00&lt;br /&gt;
| EventName = Lunch &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time    = 14h00 - 15h30&lt;br /&gt;
| RoomC1  = 092&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 260&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 15h30 - 16h50 &lt;br /&gt;
| RoomC1  = 258&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 020&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 16h50 - 17h00&lt;br /&gt;
| EventName = Coffee Break&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Room C and D/Rows &lt;br /&gt;
| Time     = 17h00 - 18h30 &lt;br /&gt;
| RoomC1  = 261&lt;br /&gt;
| RoomC2  = &lt;br /&gt;
| RoomC3  =  &lt;br /&gt;
| RoomC4  = &lt;br /&gt;
| RoomC5  = &lt;br /&gt;
| RoomD1  = 005&lt;br /&gt;
| RoomD2  = &lt;br /&gt;
| RoomD3  = &lt;br /&gt;
| RoomD4  = &lt;br /&gt;
| RoomD5  = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 18h30 - 19h50&lt;br /&gt;
| EventName = Leisure Time&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
{{:Template:Summit_2011_Schedule/Row_Event&lt;br /&gt;
| EventTime = 20h00  &lt;br /&gt;
| EventName = Dinner&lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; {{:Template:Summit 2011 Schedule Dynamic/Villas/Columns}} &lt;br /&gt;
&lt;br /&gt;
{{Summit 2011 Schedule Dynamic/Villas/Rows &lt;br /&gt;
| Time                = 21h00 - 23h00 &lt;br /&gt;
| VillaA               = 018&lt;br /&gt;
| VillaA_Number = 967&lt;br /&gt;
| VillaB               = 063&lt;br /&gt;
| VillaB_Number = 964&lt;br /&gt;
| VillaC               = 252&lt;br /&gt;
| VillaC_Number = 968&lt;br /&gt;
| VillaD               = 019&lt;br /&gt;
| VillaD_Number = 516&lt;br /&gt;
| VillaE               = &lt;br /&gt;
| VillaE_Number = &lt;br /&gt;
}} &lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session262&amp;diff=104748</id>
		<title>Summit 2011 Working Sessions/Session262</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session262&amp;diff=104748"/>
				<updated>2011-02-09T17:30:52Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: Created page with &amp;quot;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;  |-  | summit_session_attendee_name1 =  | summit_session_attendee_email1...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = &lt;br /&gt;
| summit_session_attendee_email1 = &lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = &lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = &lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5= &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6= &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7= &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8= &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9= &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10= &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11= &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12= &lt;br /&gt;
| summit_session_attendee_company12 =&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14= &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15= &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16= &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17= &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18= &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19= &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20= &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._global_committees.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._global_commitee.jpg‎]]&lt;br /&gt;
| summit_session_name = Industry Healthcare&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session262&lt;br /&gt;
| mailing_list = https://lists.owasp.org/mailman/listinfo/global_industry_committee&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Eoin Keary&lt;br /&gt;
| summit_session_leader_email1 = eoin.keary@owasp.org&lt;br /&gt;
| summit_session_leader_username1 = EoinKeary&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = Colin Watson&lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = &lt;br /&gt;
| operational_leader_email1 = &lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session262&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session262&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Summit_2011_Tracks&amp;diff=104747</id>
		<title>Category:Summit 2011 Tracks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Summit_2011_Tracks&amp;diff=104747"/>
				<updated>2011-02-09T17:27:16Z</updated>
		
		<summary type="html">&lt;p&gt;Sandra Paiva: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;[[Summit_2011 | '''Back to main Summit 2011 page''']]&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
=Introduction=&lt;br /&gt;
Click on the working session name to see the home page for that particular session. During the Summit those working session home pages will be used to document discussions and outcomes.&lt;br /&gt;
&lt;br /&gt;
If you're interested in adding a Working Session for the 2011 Summit, there still is time to start a session! Please review the [[Working Sessions Methodology|Working Session methodology]] for Working Session rules.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._metrics.jpg|link=:Category:Summit_2011_Metrics_Track]] &amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Metrics_Track|Category: Summit 2011 Metrics Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session055 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session056 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session057 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session058 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session059 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session085 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session086 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session256 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Metrics | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._browser_security.jpg|link=:Category:Summit_2011_Browser_Security_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Browser_Security_Track|Category: Summit 2011 Browser Security Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session001 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session002 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session003 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session004 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session005 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session006 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session007 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session008 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session046 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session087 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session0207 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session254 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track:_Browser_Security | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._cross_site.jpg|link=Category:Summit_2011_XSS_Eradication_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_XSS_Eradication_Track|Category: Summit 2011 XSS Eradication Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session009 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session010 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session043 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session044 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session045 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session049 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session038 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Cross-Site Scripting Eradication | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._mitigation.jpg|link=:Category:Summit_2011_Mitigation_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Mitigation_Track|Category: Summit 2011 Mitigation Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session091 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session092 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session093 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session094 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session095 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session096 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session097 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Mitigation | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._university.jpg|link=:Category:Summit_2011_University_Education_Training_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_University_Education_Training_Track|Category: Summit 2011 University Education Training Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session012 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session024 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session040 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session041 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session042 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session069 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session088 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session089 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session039 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session204 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session250 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session255 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session259 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session261 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: University Outreach, Education, and Training | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._secure_coding.jpg|link=:Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Secure_Coding_Workshop_Track|Category: Summit 2011 OWASP Secure Coding Workshop Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session025 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session026 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session027 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session028 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session029 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session030 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session031 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session033 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session034 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session047 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session252 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP Secure Coding Workshop | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._individual_projects.jpg|link=:Category:Summit_2011_Individual_OWASP_Projects_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_Individual_OWASP_Projects_Track |Category: Summit 2011 Individual OWASP Projects Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session063 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session065 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session066 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session067 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session068 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session052 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session053 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session048 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session099 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session200 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session201 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session202 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session203 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session205 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session253 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session257 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session260 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: Individual OWASP Projects | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._global_committees.jpg|link=:Category:Summit_2011_OWASP_Governance_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Governance_Track|Category: Summit 2011 OWASP Governance Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session013 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session014 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session015 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session016 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session017 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session018 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session019 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session020 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session071 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session076 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session035 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session037 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session054 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session251 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session258 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session262 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP Governance | See Track Details]]&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=[[Image:T._owasp.jpg|link=:Category:Summit_2011_OWASP_Track]]&amp;lt;br&amp;gt;&amp;lt;span style=&amp;quot;font-size:50%&amp;quot;&amp;gt;[[:Category:Summit_2011_OWASP_Track|Category: Summit 2011 OWASP Track]]&amp;lt;/span&amp;gt;=&lt;br /&gt;
&amp;lt;noinclude&amp;gt;{{:Template:Summit_2011_Working_Sessions/Columns}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session021 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session022 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session023 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session070 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session072 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session073 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session074 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session075 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session060 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session061 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session077 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session078 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session079 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session080 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session082 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session084 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session090 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session036 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session098 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session100 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session101 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session102 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session103 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session104 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
{{:Summit_2011_Working_Sessions/Session105 | Summit_2011_Working_Sessions/Rows}}&lt;br /&gt;
|}&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;[[Summit_2011_Working_Sessions#Track: OWASP | See Track Details]]&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;[[Category:Summit_2011]]&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sandra Paiva</name></author>	</entry>

	</feed>