<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=TimMorgan</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=TimMorgan"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/TimMorgan"/>
		<updated>2026-05-15T16:16:34Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Portland&amp;diff=226781</id>
		<title>Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Portland&amp;diff=226781"/>
				<updated>2017-02-25T17:49:17Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Chapter Supporters */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Portland, Oregon OWASP Chapter.&lt;br /&gt;
&lt;br /&gt;
[[File:Portland_and_Mt_Hood.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Events=&lt;br /&gt;
&lt;br /&gt;
Past and future event information can be found in [http://calagator.org/events/search?query=OWASP Calagator].&lt;br /&gt;
&lt;br /&gt;
The Portland OWASP chapter currently aims to hold a chapter meeting once every 2-3 months with additional workshops and miscellaneous other events worked in whenever possible.    Our chapter is also experimenting with a new type of workshop/hacking competition that we call [[FLOSSHack]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=For Participants=&lt;br /&gt;
OWASP Foundation ([https://docs.google.com/a/owasp.org/presentation/d/1ZgY25F0F7QgScMlB1X7LAa70LtyJql8XqcYdR4suPUo/edit#slide=id.p Overview Slides]) is a professional association of [[Membership | global members]] and is and open to anyone interested in learning more about software security. Local chapters are run independently by volunteers and guided by the [[Chapter_Leader_Handbook|Handbook]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in attending chapter meetings or otherwise getting involved, we &amp;lt;i&amp;gt;strongly&amp;lt;/i&amp;gt; encourage you to join the [http://lists.owasp.org/mailman/listinfo/owasp-Portland local chapter email list].  This list is low-volume, but acts as a great resource for local security information and announcements about chapter meetings.&lt;br /&gt;
&lt;br /&gt;
=For Speakers=&lt;br /&gt;
We would be thrilled if you would like to come give a talk at one of our chapter meetings.  Anything security-related is a good candidate for a talk and will likely draw an interested audience.  Suggestions for possible topics for future meetings:&lt;br /&gt;
&lt;br /&gt;
* Integrating security into an SDLC&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* Social engineering&lt;br /&gt;
* Application Security Tools Review &amp;amp; Comparisons&lt;br /&gt;
* Discussion starters for controversial security topics&lt;br /&gt;
* Your experiences trying to implement a security solution&lt;br /&gt;
* Security basics talks; introductions to secure coding practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our OWASP meetings typically draw between 15 to 25 attendees.  Chapter meetings are a great place to do a dry run of talks you intend to give at conferences or just to connect with locals.  Before you present, please be sure you carefully review the [[Speaker_Agreement | speaker agreement]].&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
Your current Portland chapter board:&lt;br /&gt;
&lt;br /&gt;
*Bhushan Gupta - Chapter Leader&lt;br /&gt;
*Ian Melven - Community Outreach&lt;br /&gt;
*Sonny Nallamilli - Treasurer&lt;br /&gt;
&lt;br /&gt;
Other volunteers and organizers:&lt;br /&gt;
&lt;br /&gt;
*James Bohem&lt;br /&gt;
*Adam Russell &amp;lt;adam . russell {a} owasp . org&amp;gt;&lt;br /&gt;
*Matthew Lapworth&lt;br /&gt;
*Katie Feucht&lt;br /&gt;
*Timothy D. Morgan &amp;lt;tim . morgan {a} owasp . org&amp;gt; - Founder&lt;br /&gt;
*AJ Dexter (aj.dexter 'at' gmail.com) - Founder (now retired)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Supporters =&lt;br /&gt;
Besides being funded through individual contributions and chapter memberships, our chapter is also supported through corporate sponsors.  We would like to thank our sponsors for making many excellent activities possible:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None yet!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None yet!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|link=https://www.jamasoftware.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:webmd.png|x110px|frameless|link=https://www.webmdhealthservices.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland Sponsorship Archive|Past Chapter Supporters]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;&amp;lt;big&amp;gt;Want to become a chapter supporter?  See the [[OWASP Portland Sponsorship Policy]] for more information.&amp;lt;/big&amp;gt;&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Donate ==&lt;br /&gt;
OWASP is non-profit, volunteer-managed organization.  All chapters are organized by volunteers.  By donating to your local chapter or becoming an OWASP member, you help support a variety of activities and events including chapter meetings, competitions, and training.  As a [[About_OWASP | 501(c)(3)]] non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible.  Financial contributions should only be made online using the authorized online chapter donation button.&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/memberappregion]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Oregon]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_Sponsorship_Archive&amp;diff=226780</id>
		<title>OWASP Portland Sponsorship Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_Sponsorship_Archive&amp;diff=226780"/>
				<updated>2017-02-25T17:47:53Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains an archive of companies who have sponsored the OWASP Portland chapter in the past.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:blindspot-logo.png|x90px|frameless|left|link=https://blindspotsecurity.com/]]&lt;br /&gt;
[[File:Jive.png|x100px|frameless|right|link=https://www.jivesoftware.com/]]&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|center|link=https://www.jamasoftware.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jive.png|x100px|link=https://www.jivesoftware.com/]]&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Portland&amp;diff=226779</id>
		<title>Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Portland&amp;diff=226779"/>
				<updated>2017-02-25T17:47:35Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Chapter Supporters */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Portland, Oregon OWASP Chapter.&lt;br /&gt;
&lt;br /&gt;
[[File:Portland_and_Mt_Hood.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Events=&lt;br /&gt;
&lt;br /&gt;
Past and future event information can be found in [http://calagator.org/events/search?query=OWASP Calagator].&lt;br /&gt;
&lt;br /&gt;
The Portland OWASP chapter currently aims to hold a chapter meeting once every 2-3 months with additional workshops and miscellaneous other events worked in whenever possible.    Our chapter is also experimenting with a new type of workshop/hacking competition that we call [[FLOSSHack]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=For Participants=&lt;br /&gt;
OWASP Foundation ([https://docs.google.com/a/owasp.org/presentation/d/1ZgY25F0F7QgScMlB1X7LAa70LtyJql8XqcYdR4suPUo/edit#slide=id.p Overview Slides]) is a professional association of [[Membership | global members]] and is and open to anyone interested in learning more about software security. Local chapters are run independently by volunteers and guided by the [[Chapter_Leader_Handbook|Handbook]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in attending chapter meetings or otherwise getting involved, we &amp;lt;i&amp;gt;strongly&amp;lt;/i&amp;gt; encourage you to join the [http://lists.owasp.org/mailman/listinfo/owasp-Portland local chapter email list].  This list is low-volume, but acts as a great resource for local security information and announcements about chapter meetings.&lt;br /&gt;
&lt;br /&gt;
=For Speakers=&lt;br /&gt;
We would be thrilled if you would like to come give a talk at one of our chapter meetings.  Anything security-related is a good candidate for a talk and will likely draw an interested audience.  Suggestions for possible topics for future meetings:&lt;br /&gt;
&lt;br /&gt;
* Integrating security into an SDLC&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* Social engineering&lt;br /&gt;
* Application Security Tools Review &amp;amp; Comparisons&lt;br /&gt;
* Discussion starters for controversial security topics&lt;br /&gt;
* Your experiences trying to implement a security solution&lt;br /&gt;
* Security basics talks; introductions to secure coding practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our OWASP meetings typically draw between 15 to 25 attendees.  Chapter meetings are a great place to do a dry run of talks you intend to give at conferences or just to connect with locals.  Before you present, please be sure you carefully review the [[Speaker_Agreement | speaker agreement]].&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
Your current Portland chapter board:&lt;br /&gt;
&lt;br /&gt;
*Bhushan Gupta - Chapter Leader&lt;br /&gt;
*Ian Melven - Community Outreach&lt;br /&gt;
*Sonny Nallamilli - Treasurer&lt;br /&gt;
&lt;br /&gt;
Other volunteers and organizers:&lt;br /&gt;
&lt;br /&gt;
*James Bohem&lt;br /&gt;
*Adam Russell &amp;lt;adam . russell {a} owasp . org&amp;gt;&lt;br /&gt;
*Matthew Lapworth&lt;br /&gt;
*Katie Feucht&lt;br /&gt;
*Timothy D. Morgan &amp;lt;tim . morgan {a} owasp . org&amp;gt; - Founder&lt;br /&gt;
*AJ Dexter (aj.dexter 'at' gmail.com) - Founder (now retired)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Supporters =&lt;br /&gt;
Besides being funded through individual contributions and chapter memberships, our chapter is also supported through corporate sponsors.  We would like to thank our sponsors for making many excellent activities possible:&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None yet!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|link=https://www.jamasoftware.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:webmd.png|x110px|frameless|link=https://www.webmdhealthservices.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland Sponsorship Archive|Past Chapter Supporters]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;&amp;lt;big&amp;gt;Want to become a chapter supporter?  See the [[OWASP Portland Sponsorship Policy]] for more information.&amp;lt;/big&amp;gt;&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Donate ==&lt;br /&gt;
OWASP is non-profit, volunteer-managed organization.  All chapters are organized by volunteers.  By donating to your local chapter or becoming an OWASP member, you help support a variety of activities and events including chapter meetings, competitions, and training.  As a [[About_OWASP | 501(c)(3)]] non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible.  Financial contributions should only be made online using the authorized online chapter donation button.&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/memberappregion]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Oregon]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Simple-logo.png&amp;diff=226778</id>
		<title>File:Simple-logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Simple-logo.png&amp;diff=226778"/>
				<updated>2017-02-25T17:46:51Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Simple-logo.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Portland&amp;diff=226777</id>
		<title>Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Portland&amp;diff=226777"/>
				<updated>2017-02-25T17:29:27Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Contact */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Portland, Oregon OWASP Chapter.&lt;br /&gt;
&lt;br /&gt;
[[File:Portland_and_Mt_Hood.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Events=&lt;br /&gt;
&lt;br /&gt;
Past and future event information can be found in [http://calagator.org/events/search?query=OWASP Calagator].&lt;br /&gt;
&lt;br /&gt;
The Portland OWASP chapter currently aims to hold a chapter meeting once every 2-3 months with additional workshops and miscellaneous other events worked in whenever possible.    Our chapter is also experimenting with a new type of workshop/hacking competition that we call [[FLOSSHack]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=For Participants=&lt;br /&gt;
OWASP Foundation ([https://docs.google.com/a/owasp.org/presentation/d/1ZgY25F0F7QgScMlB1X7LAa70LtyJql8XqcYdR4suPUo/edit#slide=id.p Overview Slides]) is a professional association of [[Membership | global members]] and is and open to anyone interested in learning more about software security. Local chapters are run independently by volunteers and guided by the [[Chapter_Leader_Handbook|Handbook]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in attending chapter meetings or otherwise getting involved, we &amp;lt;i&amp;gt;strongly&amp;lt;/i&amp;gt; encourage you to join the [http://lists.owasp.org/mailman/listinfo/owasp-Portland local chapter email list].  This list is low-volume, but acts as a great resource for local security information and announcements about chapter meetings.&lt;br /&gt;
&lt;br /&gt;
=For Speakers=&lt;br /&gt;
We would be thrilled if you would like to come give a talk at one of our chapter meetings.  Anything security-related is a good candidate for a talk and will likely draw an interested audience.  Suggestions for possible topics for future meetings:&lt;br /&gt;
&lt;br /&gt;
* Integrating security into an SDLC&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* Social engineering&lt;br /&gt;
* Application Security Tools Review &amp;amp; Comparisons&lt;br /&gt;
* Discussion starters for controversial security topics&lt;br /&gt;
* Your experiences trying to implement a security solution&lt;br /&gt;
* Security basics talks; introductions to secure coding practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our OWASP meetings typically draw between 15 to 25 attendees.  Chapter meetings are a great place to do a dry run of talks you intend to give at conferences or just to connect with locals.  Before you present, please be sure you carefully review the [[Speaker_Agreement | speaker agreement]].&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
Your current Portland chapter board:&lt;br /&gt;
&lt;br /&gt;
*Bhushan Gupta - Chapter Leader&lt;br /&gt;
*Ian Melven - Community Outreach&lt;br /&gt;
*Sonny Nallamilli - Treasurer&lt;br /&gt;
&lt;br /&gt;
Other volunteers and organizers:&lt;br /&gt;
&lt;br /&gt;
*James Bohem&lt;br /&gt;
*Adam Russell &amp;lt;adam . russell {a} owasp . org&amp;gt;&lt;br /&gt;
*Matthew Lapworth&lt;br /&gt;
*Katie Feucht&lt;br /&gt;
*Timothy D. Morgan &amp;lt;tim . morgan {a} owasp . org&amp;gt; - Founder&lt;br /&gt;
*AJ Dexter (aj.dexter 'at' gmail.com) - Founder (now retired)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Supporters =&lt;br /&gt;
Besides being funded through individual contributions and chapter memberships, our chapter is also supported through corporate sponsors.  We would like to thank our sponsors for making many excellent activities possible:&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None yet!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|link=https://www.jamasoftware.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:webmd.png|x110px|frameless|link=https://www.webmdhealthservices.com/]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:blindspot-logo.png|x90px|frameless|left|link=https://blindspotsecurity.com/]]&lt;br /&gt;
[[File:Jive.png|x100px|frameless|right|link=https://www.jivesoftware.com/]]&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|center|link=https://www.jamasoftware.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland Sponsorship Archive|Past Chapter Supporters]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;&amp;lt;big&amp;gt;Want to become a chapter supporter?  See the [[OWASP Portland Sponsorship Policy]] for more information.&amp;lt;/big&amp;gt;&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Donate ==&lt;br /&gt;
OWASP is non-profit, volunteer-managed organization.  All chapters are organized by volunteers.  By donating to your local chapter or becoming an OWASP member, you help support a variety of activities and events including chapter meetings, competitions, and training.  As a [[About_OWASP | 501(c)(3)]] non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible.  Financial contributions should only be made online using the authorized online chapter donation button.&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/memberappregion]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Oregon]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Portland&amp;diff=226776</id>
		<title>Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Portland&amp;diff=226776"/>
				<updated>2017-02-25T17:28:09Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Contact */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Portland, Oregon OWASP Chapter.&lt;br /&gt;
&lt;br /&gt;
[[File:Portland_and_Mt_Hood.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Events=&lt;br /&gt;
&lt;br /&gt;
Past and future event information can be found in [http://calagator.org/events/search?query=OWASP Calagator].&lt;br /&gt;
&lt;br /&gt;
The Portland OWASP chapter currently aims to hold a chapter meeting once every 2-3 months with additional workshops and miscellaneous other events worked in whenever possible.    Our chapter is also experimenting with a new type of workshop/hacking competition that we call [[FLOSSHack]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=For Participants=&lt;br /&gt;
OWASP Foundation ([https://docs.google.com/a/owasp.org/presentation/d/1ZgY25F0F7QgScMlB1X7LAa70LtyJql8XqcYdR4suPUo/edit#slide=id.p Overview Slides]) is a professional association of [[Membership | global members]] and is and open to anyone interested in learning more about software security. Local chapters are run independently by volunteers and guided by the [[Chapter_Leader_Handbook|Handbook]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in attending chapter meetings or otherwise getting involved, we &amp;lt;i&amp;gt;strongly&amp;lt;/i&amp;gt; encourage you to join the [http://lists.owasp.org/mailman/listinfo/owasp-Portland local chapter email list].  This list is low-volume, but acts as a great resource for local security information and announcements about chapter meetings.&lt;br /&gt;
&lt;br /&gt;
=For Speakers=&lt;br /&gt;
We would be thrilled if you would like to come give a talk at one of our chapter meetings.  Anything security-related is a good candidate for a talk and will likely draw an interested audience.  Suggestions for possible topics for future meetings:&lt;br /&gt;
&lt;br /&gt;
* Integrating security into an SDLC&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* Social engineering&lt;br /&gt;
* Application Security Tools Review &amp;amp; Comparisons&lt;br /&gt;
* Discussion starters for controversial security topics&lt;br /&gt;
* Your experiences trying to implement a security solution&lt;br /&gt;
* Security basics talks; introductions to secure coding practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our OWASP meetings typically draw between 15 to 25 attendees.  Chapter meetings are a great place to do a dry run of talks you intend to give at conferences or just to connect with locals.  Before you present, please be sure you carefully review the [[Speaker_Agreement | speaker agreement]].&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
Your current Portland chapter board:&lt;br /&gt;
&lt;br /&gt;
*Bhushan Gupta - Chapter Leader&lt;br /&gt;
*Ian Melven - Community Outreach&lt;br /&gt;
*Sonny Nallamilli - Treasurer&lt;br /&gt;
&lt;br /&gt;
Other volunteers and organizers:&lt;br /&gt;
&lt;br /&gt;
*James Bohem &lt;br /&gt;
*Adam Russell &amp;lt;adam . russell {a} owasp . org&amp;gt; &lt;br /&gt;
*Matthew Lapworth &lt;br /&gt;
*Timothy D. Morgan &amp;lt;tim . morgan {a} owasp . org&amp;gt; - Founder&lt;br /&gt;
*AJ Dexter (aj.dexter 'at' gmail.com) - Founder (now retired)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Supporters =&lt;br /&gt;
Besides being funded through individual contributions and chapter memberships, our chapter is also supported through corporate sponsors.  We would like to thank our sponsors for making many excellent activities possible:&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None yet!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|link=https://www.jamasoftware.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:webmd.png|x110px|frameless|link=https://www.webmdhealthservices.com/]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:blindspot-logo.png|x90px|frameless|left|link=https://blindspotsecurity.com/]]&lt;br /&gt;
[[File:Jive.png|x100px|frameless|right|link=https://www.jivesoftware.com/]]&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|center|link=https://www.jamasoftware.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland Sponsorship Archive|Past Chapter Supporters]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;&amp;lt;big&amp;gt;Want to become a chapter supporter?  See the [[OWASP Portland Sponsorship Policy]] for more information.&amp;lt;/big&amp;gt;&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Donate ==&lt;br /&gt;
OWASP is non-profit, volunteer-managed organization.  All chapters are organized by volunteers.  By donating to your local chapter or becoming an OWASP member, you help support a variety of activities and events including chapter meetings, competitions, and training.  As a [[About_OWASP | 501(c)(3)]] non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible.  Financial contributions should only be made online using the authorized online chapter donation button.&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/memberappregion]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Oregon]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Portland&amp;diff=226775</id>
		<title>Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Portland&amp;diff=226775"/>
				<updated>2017-02-25T16:53:08Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Contact */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Portland, Oregon OWASP Chapter.&lt;br /&gt;
&lt;br /&gt;
[[File:Portland_and_Mt_Hood.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Events=&lt;br /&gt;
&lt;br /&gt;
Past and future event information can be found in [http://calagator.org/events/search?query=OWASP Calagator].&lt;br /&gt;
&lt;br /&gt;
The Portland OWASP chapter currently aims to hold a chapter meeting once every 2-3 months with additional workshops and miscellaneous other events worked in whenever possible.    Our chapter is also experimenting with a new type of workshop/hacking competition that we call [[FLOSSHack]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=For Participants=&lt;br /&gt;
OWASP Foundation ([https://docs.google.com/a/owasp.org/presentation/d/1ZgY25F0F7QgScMlB1X7LAa70LtyJql8XqcYdR4suPUo/edit#slide=id.p Overview Slides]) is a professional association of [[Membership | global members]] and is and open to anyone interested in learning more about software security. Local chapters are run independently by volunteers and guided by the [[Chapter_Leader_Handbook|Handbook]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in attending chapter meetings or otherwise getting involved, we &amp;lt;i&amp;gt;strongly&amp;lt;/i&amp;gt; encourage you to join the [http://lists.owasp.org/mailman/listinfo/owasp-Portland local chapter email list].  This list is low-volume, but acts as a great resource for local security information and announcements about chapter meetings.&lt;br /&gt;
&lt;br /&gt;
=For Speakers=&lt;br /&gt;
We would be thrilled if you would like to come give a talk at one of our chapter meetings.  Anything security-related is a good candidate for a talk and will likely draw an interested audience.  Suggestions for possible topics for future meetings:&lt;br /&gt;
&lt;br /&gt;
* Integrating security into an SDLC&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* Social engineering&lt;br /&gt;
* Application Security Tools Review &amp;amp; Comparisons&lt;br /&gt;
* Discussion starters for controversial security topics&lt;br /&gt;
* Your experiences trying to implement a security solution&lt;br /&gt;
* Security basics talks; introductions to secure coding practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our OWASP meetings typically draw between 15 to 25 attendees.  Chapter meetings are a great place to do a dry run of talks you intend to give at conferences or just to connect with locals.  Before you present, please be sure you carefully review the [[Speaker_Agreement | speaker agreement]].&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
Your current Portland chapter board:&lt;br /&gt;
&lt;br /&gt;
*Bhushan Gupta - Chapter Leader&lt;br /&gt;
*Ian Melven - Community Outreach&lt;br /&gt;
*Sonny N - Treasurer&lt;br /&gt;
&lt;br /&gt;
Other volunteers and organizers:&lt;br /&gt;
&lt;br /&gt;
*James Bohem &lt;br /&gt;
*Adam Russell &amp;lt;adam . russell {a} owasp . org&amp;gt; &lt;br /&gt;
*Matthew Lapworth &lt;br /&gt;
*Timothy D. Morgan &amp;lt;tim . morgan {a} owasp . org&amp;gt; - Founder&lt;br /&gt;
*AJ Dexter (aj.dexter 'at' gmail.com) - Founder (now retired)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Supporters =&lt;br /&gt;
Besides being funded through individual contributions and chapter memberships, our chapter is also supported through corporate sponsors.  We would like to thank our sponsors for making many excellent activities possible:&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None yet!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|link=https://www.jamasoftware.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:webmd.png|x110px|frameless|link=https://www.webmdhealthservices.com/]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:blindspot-logo.png|x90px|frameless|left|link=https://blindspotsecurity.com/]]&lt;br /&gt;
[[File:Jive.png|x100px|frameless|right|link=https://www.jivesoftware.com/]]&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|center|link=https://www.jamasoftware.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland Sponsorship Archive|Past Chapter Supporters]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;&amp;lt;big&amp;gt;Want to become a chapter supporter?  See the [[OWASP Portland Sponsorship Policy]] for more information.&amp;lt;/big&amp;gt;&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Donate ==&lt;br /&gt;
OWASP is non-profit, volunteer-managed organization.  All chapters are organized by volunteers.  By donating to your local chapter or becoming an OWASP member, you help support a variety of activities and events including chapter meetings, competitions, and training.  As a [[About_OWASP | 501(c)(3)]] non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible.  Financial contributions should only be made online using the authorized online chapter donation button.&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/memberappregion]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Oregon]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Portland&amp;diff=223466</id>
		<title>Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Portland&amp;diff=223466"/>
				<updated>2016-11-16T16:27:13Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Portland, Oregon OWASP Chapter.&lt;br /&gt;
&lt;br /&gt;
[[File:Portland_and_Mt_Hood.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Events=&lt;br /&gt;
&lt;br /&gt;
Past and future event information can be found in [http://calagator.org/events/search?query=OWASP Calagator].&lt;br /&gt;
&lt;br /&gt;
The Portland OWASP chapter currently aims to hold a chapter meeting once every 2-3 months with additional workshops and miscellaneous other events worked in whenever possible.    Our chapter is also experimenting with a new type of workshop/hacking competition that we call [[FLOSSHack]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=For Participants=&lt;br /&gt;
OWASP Foundation ([https://docs.google.com/a/owasp.org/presentation/d/1ZgY25F0F7QgScMlB1X7LAa70LtyJql8XqcYdR4suPUo/edit#slide=id.p Overview Slides]) is a professional association of [[Membership | global members]] and is and open to anyone interested in learning more about software security. Local chapters are run independently by volunteers and guided by the [[Chapter_Leader_Handbook|Handbook]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in attending chapter meetings or otherwise getting involved, we &amp;lt;i&amp;gt;strongly&amp;lt;/i&amp;gt; encourage you to join the [http://lists.owasp.org/mailman/listinfo/owasp-Portland local chapter email list].  This list is low-volume, but acts as a great resource for local security information and announcements about chapter meetings.&lt;br /&gt;
&lt;br /&gt;
=For Speakers=&lt;br /&gt;
We would be thrilled if you would like to come give a talk at one of our chapter meetings.  Anything security-related is a good candidate for a talk and will likely draw an interested audience.  Suggestions for possible topics for future meetings:&lt;br /&gt;
&lt;br /&gt;
* Integrating security into an SDLC&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* Social engineering&lt;br /&gt;
* Application Security Tools Review &amp;amp; Comparisons&lt;br /&gt;
* Discussion starters for controversial security topics&lt;br /&gt;
* Your experiences trying to implement a security solution&lt;br /&gt;
* Security basics talks; introductions to secure coding practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our OWASP meetings typically draw between 15 to 25 attendees.  Chapter meetings are a great place to do a dry run of talks you intend to give at conferences or just to connect with locals.  Before you present, please be sure you carefully review the [[Speaker_Agreement | speaker agreement]].&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
Your Portland chapter organizers:&lt;br /&gt;
&lt;br /&gt;
*Timothy D. Morgan &amp;lt;tim . morgan {a} owasp . org&amp;gt; - Leader / Organizer&lt;br /&gt;
*Bhushan Gupta - Organizer&lt;br /&gt;
*James Bohem - Community Outreach&lt;br /&gt;
*Adam Russell &amp;lt;adam . russell {a} owasp . org&amp;gt; - Organizer (on hiatus)&lt;br /&gt;
*Matthew Lapworth - Organizer (on hiatus)&lt;br /&gt;
*AJ Dexter (aj.dexter 'at' gmail.com) - Founder (now retired)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Supporters =&lt;br /&gt;
Besides being funded through individual contributions and chapter memberships, our chapter is also supported through corporate sponsors.  We would like to thank our sponsors for making many excellent activities possible:&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None yet!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|link=https://www.jamasoftware.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:webmd.png|x110px|frameless|link=https://www.webmdhealthservices.com/]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:blindspot-logo.png|x90px|frameless|left|link=https://blindspotsecurity.com/]]&lt;br /&gt;
[[File:Jive.png|x100px|frameless|right|link=https://www.jivesoftware.com/]]&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|center|link=https://www.jamasoftware.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland Sponsorship Archive|Past Chapter Supporters]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;&amp;lt;big&amp;gt;Want to become a chapter supporter?  See the [[OWASP Portland Sponsorship Policy]] for more information.&amp;lt;/big&amp;gt;&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Donate ==&lt;br /&gt;
OWASP is non-profit, volunteer-managed organization.  All chapters are organized by volunteers.  By donating to your local chapter or becoming an OWASP member, you help support a variety of activities and events including chapter meetings, competitions, and training.  As a [[About_OWASP | 501(c)(3)]] non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible.  Financial contributions should only be made online using the authorized online chapter donation button.&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/memberappregion]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Oregon]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222917</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222917"/>
				<updated>2016-11-02T02:20:09Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rogue Hall, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 1717 Southwest Park Ave.&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration (Near Room 298)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Introduction to Injection Vulnerabilities&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer @ Rogue Hall&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
There are a '''large''' number of restaurants nearby, but in case you're having trouble deciding (or your phone battery died), here are some possibilities:&lt;br /&gt;
&lt;br /&gt;
* Baan-Thai Restaurant, 1924 SW Broadway&lt;br /&gt;
* Hotlips Pizza, 1909 SW 6th Ave&lt;br /&gt;
* Laughing Planet Cafe, 1720 SW 4th Ave&lt;br /&gt;
* Love Belizean, 1503 SW Broadway&lt;br /&gt;
* McMenamins Market Street Pub, 1526 SW 10th Ave&lt;br /&gt;
* There is also a block of food carts on SW 4th Ave between Hall St &amp;amp; College St.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
''All classes are completely sold out. :-\ ''&lt;br /&gt;
&lt;br /&gt;
''Most of our seats sold out within 48 hours.  Something to keep in mind next time we hold one of these events!''&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222916</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222916"/>
				<updated>2016-11-02T02:19:54Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Lunch Ideas */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rogue Hall, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 1717 Southwest Park Ave.&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration (Near Room 298)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Introduction to Injection Vulnerabilities&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer @ Rogue Hall&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
There are a '''large''' number of restaurants nearby, but in case you're having trouble deciding (or your phone battery died), here are some possibilities:&lt;br /&gt;
&lt;br /&gt;
* Baan-Thai Restaurant, 1924 SW Broadway&lt;br /&gt;
* Hotlips Pizza, 1909 SW 6th Ave&lt;br /&gt;
* Laughing Planet Cafe, 1720 SW 4th Ave&lt;br /&gt;
* Love Belizean, 1503 SW Broadway&lt;br /&gt;
* McMenamins Market Street Pub, 1526 SW 10th Ave&lt;br /&gt;
* There is also a block of food carts on SW 4th Ave between Hall St &amp;amp; College St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
''All classes are completely sold out. :-\ ''&lt;br /&gt;
&lt;br /&gt;
''Most of our seats sold out within 48 hours.  Something to keep in mind next time we hold one of these events!''&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222915</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222915"/>
				<updated>2016-11-02T02:19:27Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* How to Register */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rogue Hall, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 1717 Southwest Park Ave.&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration (Near Room 298)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Introduction to Injection Vulnerabilities&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer @ Rogue Hall&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
There are a *large* number of restaurants nearby, but in case you're having trouble deciding (or your phone battery died), here are some possibilities:&lt;br /&gt;
&lt;br /&gt;
* Baan-Thai Restaurant, 1924 SW Broadway&lt;br /&gt;
* Hotlips Pizza, 1909 SW 6th Ave&lt;br /&gt;
* Laughing Planet Cafe, 1720 SW 4th Ave&lt;br /&gt;
* Love Belizean, 1503 SW Broadway&lt;br /&gt;
* McMenamins Market Street Pub, 1526 SW 10th Ave&lt;br /&gt;
* There is also a block of food carts on SW 4th Ave between Hall St &amp;amp; College St.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
''All classes are completely sold out. :-\ ''&lt;br /&gt;
&lt;br /&gt;
''Most of our seats sold out within 48 hours.  Something to keep in mind next time we hold one of these events!''&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222914</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222914"/>
				<updated>2016-11-02T02:16:45Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rogue Hall, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 1717 Southwest Park Ave.&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration (Near Room 298)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Introduction to Injection Vulnerabilities&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer @ Rogue Hall&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
There are a *large* number of restaurants nearby, but in case you're having trouble deciding (or your phone battery died), here are some possibilities:&lt;br /&gt;
&lt;br /&gt;
* Baan-Thai Restaurant, 1924 SW Broadway&lt;br /&gt;
* Hotlips Pizza, 1909 SW 6th Ave&lt;br /&gt;
* Laughing Planet Cafe, 1720 SW 4th Ave&lt;br /&gt;
* Love Belizean, 1503 SW Broadway&lt;br /&gt;
* McMenamins Market Street Pub, 1526 SW 10th Ave&lt;br /&gt;
* There is also a block of food carts on SW 4th Ave between Hall St &amp;amp; College St.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222913</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222913"/>
				<updated>2016-11-02T02:16:31Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Details */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rogue Hall, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 1717 Southwest Park Ave.&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration (Near Room 298)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Introduction to Injection Vulnerabilities&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer @ Rogue Hall&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
There are a *large* number of restaurants nearby, but in case you're having trouble deciding (or your phone battery died), here are some possibilities:&lt;br /&gt;
&lt;br /&gt;
* Baan-Thai Restaurant, 1924 SW Broadway&lt;br /&gt;
* Hotlips Pizza, 1909 SW 6th Ave&lt;br /&gt;
* Laughing Planet Cafe, 1720 SW 4th Ave&lt;br /&gt;
* Love Belizean, 1503 SW Broadway&lt;br /&gt;
* McMenamins Market Street Pub, 1526 SW 10th Ave&lt;br /&gt;
* There is also a block of food carts on SW 4th Ave between Hall St &amp;amp; College St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222851</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222851"/>
				<updated>2016-10-29T01:30:33Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Schedule */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rogue Hall, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 1717 Southwest Park Ave.&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration (Near Room 298)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Introduction to Injection Vulnerabilities&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 298: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room 333: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer @ Rogue Hall&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222850</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222850"/>
				<updated>2016-10-28T22:30:12Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Schedule */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rogue Hall, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 1717 Southwest Park Ave.&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer @ Rogue Hall&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222849</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222849"/>
				<updated>2016-10-28T22:30:01Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Details */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rogue Hall, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 1717 Southwest Park Ave.&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222848</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222848"/>
				<updated>2016-10-28T22:27:02Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Padding_Oracle_(OTG-CRYPST-002)&amp;diff=222589</id>
		<title>Testing for Padding Oracle (OTG-CRYPST-002)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Padding_Oracle_(OTG-CRYPST-002)&amp;diff=222589"/>
				<updated>2016-10-21T15:45:35Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Tools */ alphabetized tools, added Bletchley&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A padding oracle is a function of an application which decrypts encrypted data provided by the client, e.g. internal session state stored on the client, and leaks the state of the validity of the padding after decryption. The existence of a padding oracle allows an attacker to decrypt encrypted data and encrypt arbitrary data without knowledge of the key used for these cryptographic operations. This can lead to leakage of sensible data or to privilege escalation vulnerabilities, if integrity of the encrypted data is assumed by the application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Block ciphers encrypt data only in blocks of certain sizes. Block sizes used by common ciphers are 8 and 16 bytes. Data where the size doesn't match a multiple of the block size of the used cipher has to be padded in a specific manner so the decryptor is able to strip the padding. A commonly used padding scheme is PKCS#7. It fills the remaining bytes with the value of the padding length.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Example:''' &lt;br /&gt;
&lt;br /&gt;
If the padding has the length of 5 bytes, the byte value 0x05 is repeated five times after the plain text. &lt;br /&gt;
&lt;br /&gt;
An error condition is present if the padding doesn't match the syntax of the used padding scheme. A padding oracle is present if an application leaks this specific padding error condition for encrypted data provided by the client. This can happen by exposing exceptions (e.g. BadPaddingException in Java) directly, by subtle differences in the responses sent to the client or by another side-channel like timing behavior.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Certain modes of operation of cryptography allow bit-flipping attacks, where flipping of a bit in the cipher text causes that the bit is also flipped in the plain text. Flipping a bit in the n-th block of CBC encrypted data causes that the same bit in the (n+1)-th block is flipped in the decrypted data. The n-th block of the decrypted cipher text is garbaged by this manipulation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The padding oracle attack enables an attacker to decrypt encrypted data without knowledge of the encryption key and used cipher by sending skillful manipulated cipher texts to the padding oracle and observing of the results returned by it. This causes loss of confidentiality of the encrypted data. E.g. in the case of session data stored on the client side the attacker can gain information about the internal state and structure of the application. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A padding oracle attack also enables an attacker to encrypt arbitrary plain texts without knowledge of the used key and cipher. If the application assumes that integrity and authenticity of the decrypted data is given, an attacker could be able to manipulate internal session state and possibly gain higher privileges.&lt;br /&gt;
&lt;br /&gt;
==How to Test==&lt;br /&gt;
=== Black Box Testing ===&lt;br /&gt;
'''Testing for padding oracle vulnerabilities:''' &amp;lt;br&amp;gt;&lt;br /&gt;
First the possible input points for padding oracles must be identified. Generally the following conditions must be met:&lt;br /&gt;
&lt;br /&gt;
# The data is encrypted. Good candidates are values which appear to be random.&lt;br /&gt;
# A block cipher is used. The length of the decoded (Base64 is used often) cipher text is a multiple of common cipher block sizes like 8 or 16 bytes. Different cipher texts (e.g. gathered by different sessions or manipulation of session state) share a common divisor in the length.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Example:''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Dg6W8OiWMIdVokIDH15T/A==&amp;lt;/nowiki&amp;gt; results after Base64 decoding in 0e 0e 96 f0 e8 96 30 87 55 a2 42 03 1f 5e 53 fc. This seems to be random and 16 byte long.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If such an input value candidate is identified, the behavior of the application to bit-wise tampering of the encrypted value should be verified. Normally this Base64 encoded value will include the initialization vector (IV) prepended to the cipher text. Given a plaintext ''&amp;lt;tt&amp;gt;p&amp;lt;/tt&amp;gt;'' and a cipher with a block size ''&amp;lt;tt&amp;gt;n&amp;lt;/tt&amp;gt;'', the number of blocks will be ''&amp;lt;tt&amp;gt;b = ceil( length(b) / n)&amp;lt;/tt&amp;gt;''. The length of the encrypted string will be ''&amp;lt;tt&amp;gt;y=(b+1)*n&amp;lt;/tt&amp;gt;'' due to the initialization vector. To verify the presence of the oracle, decode the string, flip the last bit of the second-to-last block ''&amp;lt;tt&amp;gt;b-1&amp;lt;/tt&amp;gt;'' (the least significant bit of the byte at ''&amp;lt;tt&amp;gt;y-n-1&amp;lt;/tt&amp;gt;''), re-encode and send. Next, decode the original string, flip the last bit of the block ''&amp;lt;tt&amp;gt;b-2&amp;lt;/tt&amp;gt;'' (the least significant bit of the byte at ''&amp;lt;tt&amp;gt;y-2*n-1&amp;lt;/tt&amp;gt;''), re-encode and send. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If it is known that the encrypted string is a single block (the IV is stored on the server or the application is using a bad practice hardcoded IV), several bit flips must be performed in turn. An alternative approach could be to prepend a random block, and flip bits in order to make the last byte of the added block take all possible values (0 to 255).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tests and the base value should at least cause three different states while and after decryption:&lt;br /&gt;
&lt;br /&gt;
* Cipher text gets decrypted, resulting data is correct.&lt;br /&gt;
* Cipher text gets decrypted, resulting data is garbled and causes some exception or error handling in the application logic.&lt;br /&gt;
* Cipher text decryption fails due to padding errors.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Compare the responses carefully. Search especially for exceptions and messages which state that something is wrong with the padding. If such messages appear, the application contains a padding oracle. If the three different states described above are observable implicitly (different error messages, timing side-channels), there is a high probability that there is a padding oracle present at this point. Try to perform the padding oracle attack to ensure this.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Examples:'''&lt;br /&gt;
* ASP.NET throws &amp;quot;System.Security.Cryptography.CryptographicException: Padding is invalid and cannot be removed.&amp;quot; if padding of a decrypted cipher text is broken.&lt;br /&gt;
* In Java a javax.crypto.BadPaddingException is thrown in this case.&lt;br /&gt;
* Decryption errors or similar can be possible padding oracles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
A secure implementation will check for integrity and cause only two responses: ok and failed. There are no side channels which can be used to determine internal error states.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Grey Box Testing===&lt;br /&gt;
'''Testing for padding oracle vulnerabilities:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Verify that all places where encrypted data from the client, that should only be known by the server, is decrypted. The following conditions should be met by such code:&lt;br /&gt;
&lt;br /&gt;
# The integrity of the cipher text should be verified by a secure mechanism, like HMAC or authenticated cipher operation modes like GCM or CCM.&lt;br /&gt;
# All error states while decryption and further processing are handled uniformly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
* Bletchley - [https://code.blindspotsecurity.com/trac/bletchley https://code.blindspotsecurity.com/trac/bletchley]&lt;br /&gt;
* PadBuster - [https://github.com/GDSSecurity/PadBuster https://github.com/GDSSecurity/PadBuster]&lt;br /&gt;
* Padding Oracle Exploitation Tool (POET) - [http://netifera.com/research/ http://netifera.com/research/]&lt;br /&gt;
* Poracle - [https://github.com/iagox86/Poracle https://github.com/iagox86/Poracle]&lt;br /&gt;
* python-paddingoracle - [https://github.com/mwielgoszewski/python-paddingoracle https://github.com/mwielgoszewski/python-paddingoracle]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Examples'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Visualization of the decryption process - [http://erlend.oftedal.no/blog/poet/ http://erlend.oftedal.no/blog/poet/]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Wikipedia - Padding oracle attack - [http://en.wikipedia.org/wiki/Padding_oracle_attack http://en.wikipedia.org/wiki/Padding_oracle_attack]&lt;br /&gt;
* Juliano Rizzo, Thai Duong, &amp;quot;Practical Padding Oracle Attacks&amp;quot; - [http://www.usenix.org/event/woot10/tech/full_papers/Rizzo.pdf http://www.usenix.org/event/woot10/tech/full_papers/Rizzo.pdf]&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222430</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222430"/>
				<updated>2016-10-15T16:12:33Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Cyber Hygiene - Critical Security Controls */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Anthony Gold''&amp;lt;br&amp;gt;&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222405</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222405"/>
				<updated>2016-10-13T23:36:13Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Schedule */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Communications Security in Modern Software&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222376</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222376"/>
				<updated>2016-10-12T18:48:03Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:OHSU.png|link=https://www.ohsu.edu/xd/education/schools/school-of-medicine/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OHSU.png&amp;diff=222375</id>
		<title>File:OHSU.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OHSU.png&amp;diff=222375"/>
				<updated>2016-10-12T18:46:47Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222374</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222374"/>
				<updated>2016-10-12T18:43:56Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Communications Security in Modern Software */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://www.ohsu.edu/xd/education/schools/school-of-medicine/ OHSU School of Medicine]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222372</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222372"/>
				<updated>2016-10-12T18:41:52Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Courses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://ohsu.edu/ OHSU]''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222361</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222361"/>
				<updated>2016-10-12T15:30:51Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Applied Physical Attacks on Embedded Systems, Introductory Version */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Scott Davis''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222356</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222356"/>
				<updated>2016-10-12T03:23:22Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Communications Security in Modern Software */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&amp;lt;br /&amp;gt;&lt;br /&gt;
''Assistant: Sonny''&amp;lt;br&amp;gt;&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222352</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222352"/>
				<updated>2016-10-11T22:12:29Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* How to Register */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&lt;br /&gt;
&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
'''Please visit the registration page here to sign up: https://owasp-portland-training-2016.eventbrite.com/ '''&lt;br /&gt;
&lt;br /&gt;
Each student can attend one morning session and/or one afternoon session.  Be sure to sign up soon, these courses are likely to fill up fast!&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222328</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=222328"/>
				<updated>2016-10-11T16:50:20Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Fuzzing: Introduction &amp;amp; Practice */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Communications Security in Modern Software===&lt;br /&gt;
''Instructor: Adam Russell''&lt;br /&gt;
&lt;br /&gt;
Securing communications over untrusted networks is a critical &lt;br /&gt;
component to any modern application's security.  However, far too&lt;br /&gt;
often developers and operations personnel become tripped up by the&lt;br /&gt;
many pitfalls of implementation in this area, which often leads to&lt;br /&gt;
complete failures to secure data on the wire.  In this course we&lt;br /&gt;
discuss how attackers can gain access to other users' communication&lt;br /&gt;
through a variety of techniques and cover the strategies for&lt;br /&gt;
preventing this.  The course covers specific topics ranging from the&lt;br /&gt;
SSL/TLS certificate authority system, to secure web session management&lt;br /&gt;
and mobile communications security.  A hands-on exercise is included &lt;br /&gt;
in the course which helps students empirically test SSL/TLS certificate&lt;br /&gt;
validation in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221977</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221977"/>
				<updated>2016-09-30T17:09:13Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
''Instructor: Brian Ventura''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
''Instructor: Timothy D. Morgan''&amp;lt;br&amp;gt;&lt;br /&gt;
''Assistant: Bhushan Gupta''&amp;lt;br&amp;gt;&lt;br /&gt;
''Sponsored by [https://newrelic.com/ New Relic]''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
''Instructor: Joe Fitzpatrick''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
''Instructor: Adam Russell''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221968</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221968"/>
				<updated>2016-09-30T16:12:15Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png|link=http://pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221967</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221967"/>
				<updated>2016-09-30T16:09:40Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Newrelic.png&amp;diff=221966</id>
		<title>File:Newrelic.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Newrelic.png&amp;diff=221966"/>
				<updated>2016-09-30T16:08:24Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Newrelic.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Github.png&amp;diff=221965</id>
		<title>File:Github.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Github.png&amp;diff=221965"/>
				<updated>2016-09-30T16:07:38Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Github.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit.png&amp;diff=221964</id>
		<title>File:Summit.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit.png&amp;diff=221964"/>
				<updated>2016-09-30T16:07:12Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Summit.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Simple.png&amp;diff=221963</id>
		<title>File:Simple.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Simple.png&amp;diff=221963"/>
				<updated>2016-09-30T16:06:49Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Simple.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Pnsqc.png&amp;diff=221962</id>
		<title>File:Pnsqc.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Pnsqc.png&amp;diff=221962"/>
				<updated>2016-09-30T16:06:32Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Pnsqc.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221961</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221961"/>
				<updated>2016-09-30T16:01:15Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
The following sponsors have made this event possible.  &lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221960</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221960"/>
				<updated>2016-09-30T16:00:19Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* General Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221959</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221959"/>
				<updated>2016-09-30T15:59:52Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Morning Refreshments Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221958</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221958"/>
				<updated>2016-09-30T15:58:31Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221957</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221957"/>
				<updated>2016-09-30T15:57:39Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Courses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221956</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221956"/>
				<updated>2016-09-30T15:57:28Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221955</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221955"/>
				<updated>2016-09-30T15:56:55Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Morning Refreshments Sponsors ===&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 at:&lt;br /&gt;
&lt;br /&gt;
 PSU - Smith Memorial Student Union Building&lt;br /&gt;
 1825 SW Broadway&lt;br /&gt;
 Portland, OR 97201&lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221954</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221954"/>
				<updated>2016-09-30T15:53:02Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Courses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses are held in two tracks: two in the morning session, and two in the afternoon session.  Each student can register for one morning course, or one afternoon course, or one of each.  The four courses offered are as follows:&lt;br /&gt;
&lt;br /&gt;
== Morning Session ==&lt;br /&gt;
===Cyber Hygiene - Critical Security Controls===&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Introduction to Injection Vulnerabilities===&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session ==&lt;br /&gt;
&lt;br /&gt;
===Applied Physical Attacks on Embedded Systems, Introductory Version===&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Fuzzing: Introduction &amp;amp; Practice===&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org&lt;br /&gt;
&lt;br /&gt;
== Mixer Sponsors==&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
== Training Session Sponsors ==&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Morning Refreshments Sponsors ==&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 in PSU's Smith Memorial Student Union Building at 1825 SW Broadway, Portland, OR 97201.  Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221953</id>
		<title>OWASP Portland 2016 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2016_Training_Day&amp;diff=221953"/>
				<updated>2016-09-30T15:50:25Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: /* Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This year the Portland OWASP chapter is hosting a training day.  This will be an excellent opportunity for students to receive quality information security and application security training for next to nothing.  It will also be a great chance to network with the local infosec community.&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Four courses will be offered in 2 separate tracks.  A full schedule has yet to be determined, but the courses offered will likely be as follows:&lt;br /&gt;
&lt;br /&gt;
==Applied Physical Attacks on Embedded Systems, Introductory Version==&lt;br /&gt;
'''Instructor: Joe Fitzpatrick'''&lt;br /&gt;
&lt;br /&gt;
This workshop introduces several different relatively accessible interfaces&lt;br /&gt;
on embedded systems. Attendees will get hands-on experience with UART, SPI,&lt;br /&gt;
and JTAG interfaces on a MIPS-based wifi router. After a brief&lt;br /&gt;
architectural overview of each interface, hands-on labs will guide through&lt;br /&gt;
the process understanding, observing, interacting with, and exploiting the&lt;br /&gt;
interface to potentially access a root shell on the target.  &lt;br /&gt;
&lt;br /&gt;
==Introduction to Injection Vulnerabilities==&lt;br /&gt;
'''Instructor: Timothy D. Morgan'''&lt;br /&gt;
&lt;br /&gt;
Ever concatenated strings in your code? Did those strings include any kind of structured syntax? Then your code might be vulnerable to injection.  Injection flaws are broad, common category of vulnerability in modern software. While many developers are aware of high-profile technical issues, such as SQL injection, any number of injection vulnerabilities are possible in other languages, protocols, and syntaxes. Upon studying these flaws in many contexts, an underlying &amp;quot;theory of injection&amp;quot; emerges. This simple concept can be applied to many situations (including new technologies and those yet to be invented) to help developers avoid the most common types of implementation vulnerabilities.  The reason why &amp;quot;injection&amp;quot; is #1 on the OWASP Top 10 will become very clear by the end of this class.  This course will provide students a detailed introduction to injection vulnerabilities and then get students busy with hands-on exercises where a variety of different injection flaws can be explored and understood in real-world contexts.&lt;br /&gt;
&lt;br /&gt;
==Fuzzing: Introduction &amp;amp; Practice==&lt;br /&gt;
'''Instructor: Adam Russell'''&lt;br /&gt;
&lt;br /&gt;
The training starts with the theory of fuzzing.  No prior&lt;br /&gt;
knowledge is assumed. Each fuzzing topic and technique utilizes interesting&lt;br /&gt;
case studies and scenarios to highlight the use-cases of fuzzing and their&lt;br /&gt;
practicality.  The training utilizes practical sessions (e.g. fuzzing image&lt;br /&gt;
formats, web application data flow, etc) to gain hands-on experience with&lt;br /&gt;
fuzzing tools. This training will equip participants with the necessary&lt;br /&gt;
skills and knowledge to conduct basic fuzzing of products.&lt;br /&gt;
&lt;br /&gt;
==Cyber Hygiene - Critical Security Controls==&lt;br /&gt;
'''Instructor: Brian Ventura'''&lt;br /&gt;
&lt;br /&gt;
With so many types of network attacks and so many tools/solutions to combat these attacks, which should I implement first? Which should I buy? Can I build it myself? The CIS Critical Security Controls are a prioritized approach to ensuring information security. As a general risk assessment, the Critical Security Controls address the past, current and expected attacks occurring across the Internet. In this course we will outline the controls, discuss implementation and testing, and provide examples.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
Interested in becoming a sponsor?  Please contact: tim ''DOT'' morgan ''AT'' owasp.org&lt;br /&gt;
&lt;br /&gt;
== Mixer Sponsors==&lt;br /&gt;
&lt;br /&gt;
''None Yet!''&lt;br /&gt;
&lt;br /&gt;
== Training Session Sponsors ==&lt;br /&gt;
[[File:newrelic.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Morning Refreshments Sponsors ==&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:pnsqc.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Sponsors ==&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:summit.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:github.png]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
The training day will be held on Wednesday, November 2 in PSU's Smith Memorial Student Union Building at 1825 SW Broadway, Portland, OR 97201.  Later in the evening, a social mixer will also be held at TODO.&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot;|Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;|Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Introduction to Injection Vulnerabilities&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Cyber Hygiene - Critical Security Controls&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Applied Physical Attacks on Embedded Systems&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|Room TBD: Fuzzing: Introduction &amp;amp; Practice&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot;|6:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot;| Evening Mixer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Pnsqc.png&amp;diff=221952</id>
		<title>File:Pnsqc.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Pnsqc.png&amp;diff=221952"/>
				<updated>2016-09-30T15:49:20Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Newrelic.png&amp;diff=221948</id>
		<title>File:Newrelic.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Newrelic.png&amp;diff=221948"/>
				<updated>2016-09-30T15:35:45Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Newrelic.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Github.png&amp;diff=221947</id>
		<title>File:Github.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Github.png&amp;diff=221947"/>
				<updated>2016-09-30T15:34:35Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Github.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit.png&amp;diff=221946</id>
		<title>File:Summit.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit.png&amp;diff=221946"/>
				<updated>2016-09-30T15:34:21Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Summit.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Simple.png&amp;diff=221945</id>
		<title>File:Simple.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Simple.png&amp;diff=221945"/>
				<updated>2016-09-30T15:34:02Z</updated>
		
		<summary type="html">&lt;p&gt;TimMorgan: TimMorgan uploaded a new version of &amp;amp;quot;File:Simple.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>TimMorgan</name></author>	</entry>

	</feed>