<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tin+Zaw</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tin+Zaw"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Tin_Zaw"/>
		<updated>2026-04-22T05:49:35Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=228769</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=228769"/>
				<updated>2017-04-17T16:12:32Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: AppSec Cali 2017 uploaded&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* '''OAT-020'''	  Account Aggregation&lt;br /&gt;
* '''OAT-019'''	  Account Creation&lt;br /&gt;
* '''OAT-003'''	  Ad Fraud&lt;br /&gt;
* '''OAT-009'''	  CAPTCHA Bypass&lt;br /&gt;
* '''OAT-010'''	  Card Cracking&lt;br /&gt;
* '''OAT-001'''	  Carding&lt;br /&gt;
* '''OAT-012'''	  Cashing Out&lt;br /&gt;
* '''OAT-007'''	  Credential Cracking&lt;br /&gt;
* '''OAT-008'''	  Credential Stuffing&lt;br /&gt;
* '''OAT-015'''	  Denial of Service&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* '''OAT-006'''	  Expediting&lt;br /&gt;
* '''OAT-004'''	  Fingerprinting&lt;br /&gt;
* '''OAT-018'''	  Footprinting&lt;br /&gt;
* '''OAT-005'''	  Scalping&lt;br /&gt;
* '''OAT-011'''	  Scraping&lt;br /&gt;
* '''OAT-016'''	  Skewing&lt;br /&gt;
* '''OAT-013'''	  Sniping&lt;br /&gt;
* '''OAT-017'''	  Spamming&lt;br /&gt;
* '''OAT-002'''	  Token Cracking&lt;br /&gt;
* '''OAT-014'''	  Vulnerability Scanning&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the new [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against automated threats&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Another vulnerability list&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Attack trees&lt;br /&gt;
* Non web&lt;br /&gt;
* Non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Colinwatson-a-new-ontology-of-unwanted-automation.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [09-10 May 2017] Session at OWASP AppSecEU [https://2017.appsec.eu/program/project-summit project summit]&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [15 Jul 2016] Tin Zaw becomes co project leader&lt;br /&gt;
* [12 Jul 2016] Work on v1.1 begun&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The list of threat events and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-020'''	  Account Aggregation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-019'''	  Account Creation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-003'''	  Ad Fraud&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-009'''	  CAPTCHA Bypass&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-010'''	  Card Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-001'''	  Carding&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-012'''	  Cashing Out&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-007'''	  Credential Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-008'''	  Credential Stuffing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-015'''	  Denial of Service&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-006'''	  Expediting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-004'''	  Fingerprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-018'''	  Footprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-005'''	  Scalping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-011'''	  Scraping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-016'''	  Skewing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-013'''	  Sniping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-017'''	  Spamming&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-002'''	  Token Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-014'''	  Vulnerability Scanning&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leader directly: [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in March 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* Dec-Mar 2017: Further review and update to handbook&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* Release v1.2&lt;br /&gt;
* Project summit at AppSecEU&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:BadBots_OWASP_AppSec_CA_2017.pptx&amp;diff=228768</id>
		<title>File:BadBots OWASP AppSec CA 2017.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:BadBots_OWASP_AppSec_CA_2017.pptx&amp;diff=228768"/>
				<updated>2017-04-17T16:05:06Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: Presentation at OWASP AppSec California (2017) conference.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Presentation at OWASP AppSec California (2017) conference.&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=219081</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=219081"/>
				<updated>2016-07-19T00:43:36Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities.. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also intends to identify symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* '''OAT-020'''	  Account Aggregation&lt;br /&gt;
* '''OAT-019'''	  Account Creation&lt;br /&gt;
* '''OAT-003'''	  Ad Fraud&lt;br /&gt;
* '''OAT-009'''	  CAPTCHA Bypass&lt;br /&gt;
* '''OAT-010'''	  Card Cracking&lt;br /&gt;
* '''OAT-001'''	  Carding&lt;br /&gt;
* '''OAT-012'''	  Cashing Out&lt;br /&gt;
* '''OAT-007'''	  Credential Cracking&lt;br /&gt;
* '''OAT-008'''	  Credential Stuffing&lt;br /&gt;
* '''OAT-015'''	  Denial of Service&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* '''OAT-006'''	  Expediting&lt;br /&gt;
* '''OAT-004'''	  Fingerprinting&lt;br /&gt;
* '''OAT-018'''	  Footprinting&lt;br /&gt;
* '''OAT-005'''	  Scalping&lt;br /&gt;
* '''OAT-011'''	  Scraping&lt;br /&gt;
* '''OAT-016'''	  Skewing&lt;br /&gt;
* '''OAT-013'''	  Sniping&lt;br /&gt;
* '''OAT-017'''	  Spamming&lt;br /&gt;
* '''OAT-002'''	  Token Cracking&lt;br /&gt;
* '''OAT-014'''	  Vulnerability Scanning&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against automated threats&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Another vulnerability list&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Attack trees&lt;br /&gt;
* Non web&lt;br /&gt;
* Non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Colinwatson-a-new-ontology-of-unwanted-automation.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [15 Jul 2016] Tin Zaw becomes co project leader&lt;br /&gt;
* [12 Jul 2016] Work on v1.1 begun&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
* [30 Jul 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.00 handbook] published&lt;br /&gt;
* [20 May 2015] Meeting at project summit in Amsterdam&lt;br /&gt;
* [12 May 2015] Discussion document published&lt;br /&gt;
* [27 Apr 2015] Final summary of research published&lt;br /&gt;
* [21 Apr 2015] Notice in OWASP Connector&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22295560.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22295560.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The list of threat events and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-020'''	  Account Aggregation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-019'''	  Account Creation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-003'''	  Ad Fraud&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-009'''	  CAPTCHA Bypass&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-010'''	  Card Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-001'''	  Carding&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-012'''	  Cashing Out&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-007'''	  Credential Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-008'''	  Credential Stuffing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-015'''	  Denial of Service&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-006'''	  Expediting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-004'''	  Fingerprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-018'''	  Footprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-005'''	  Scalping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-011'''	  Scraping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-016'''	  Skewing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-013'''	  Sniping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-017'''	  Spamming&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-002'''	  Token Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-014'''	  Vulnerability Scanning&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track&lt;br /&gt;
in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/		&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page				&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
''This page is in the process of creation''&lt;br /&gt;
&lt;br /&gt;
; How do you define &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: Answer&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;XYZ&amp;quot; already did that?&lt;br /&gt;
: Answer&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Answer&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
[mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
&lt;br /&gt;
Jason Chan&lt;br /&gt;
&lt;br /&gt;
Mark Hall&lt;br /&gt;
&lt;br /&gt;
Andrew van der Stock&lt;br /&gt;
&lt;br /&gt;
Roland Weber&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Tin_Zaw Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leader directly: [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in June 2015.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* Jul-Sep 2016: Gathering of additional contributions and update handbook.&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* Oct 2016: Release updated handbook.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tin_Zaw&amp;diff=219080</id>
		<title>User:Tin Zaw</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tin_Zaw&amp;diff=219080"/>
				<updated>2016-07-19T00:40:28Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Tin Zaw is a former president of OWASP Los Angeles chapter and currently co-leads Automated Web Threats project. &lt;br /&gt;
&lt;br /&gt;
Tin holds an MBA and a Master’s degree from University of Southern California, and a Bachelor’s degree from Pittsburg State University, Kansas. Tin has held Certified Information Systems Security Professional (CISSP) and Certified Secure Software Lifecycle Professional (CSSLP) certificates.&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tin_Zaw&amp;diff=219079</id>
		<title>User:Tin Zaw</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tin_Zaw&amp;diff=219079"/>
				<updated>2016-07-19T00:39:48Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Tin Zaw is a former president of OWASP Los Angeles chapter and currently co-leads Automated Web Threats project. &lt;br /&gt;
&lt;br /&gt;
Tin holds an MBA and a Master’s degree from University of Southern California, and a Bachelor’s degree from Pittsburg State University, Kansas. Tin has held a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tin_Zaw&amp;diff=219060</id>
		<title>User:Tin Zaw</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tin_Zaw&amp;diff=219060"/>
				<updated>2016-07-18T22:46:41Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Tin Zaw is a former president of OWASP Los Angeles chapter and currently co-leads Automated Web Threats projects. &lt;br /&gt;
&lt;br /&gt;
Tin holds an MBA and a Master’s degree from University of Southern California, and a Bachelor’s degree from Pittsburg State University, Kansas. Tin has held a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tin_Zaw&amp;diff=149184</id>
		<title>User:Tin Zaw</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tin_Zaw&amp;diff=149184"/>
				<updated>2013-04-05T00:13:43Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Tin Zaw is a former president of OWASP Los Angeles chapter and continues to serve on its board of directors. At OWASP he has served as chair of Global Chapters Committee and co-chair of AppSec USA 2010 organizing committee. &lt;br /&gt;
&lt;br /&gt;
Tin's day job focuses on securing products at Intuit, maker of TurboTax, Quicken and Mint.com. Tin has worked at companies such as AT&amp;amp;T, Symantec, Inktomi (now Yahoo!) and QUALCOMM as a software engineer, technical manager, security architect and head of security. &lt;br /&gt;
&lt;br /&gt;
Tin holds an MBA and a Master’s degree from University of Southern California, and a Bachelor’s degree from Pittsburg State University, Kansas. Tin is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=134448</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=134448"/>
				<updated>2012-08-17T02:19:11Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
'''Sponsors and Supporters Donate Here:''' &lt;br /&gt;
=====https://www.cvent.com/events/owasp-sponsorship-and-donation/registration-99bc1441e2684ff5b214b0df6b3a9ae3.aspx=====&lt;br /&gt;
&lt;br /&gt;
Single Meeting Supporter:&lt;br /&gt;
Organizations that wish to support the OWASP Los Angeles Chapter with a 100% tax deductible donation  enable the OWASP Foundation to continue its mission &lt;br /&gt;
Get the following benefits::&lt;br /&gt;
 - Meet upwards of 60-70 potential new clients&lt;br /&gt;
 - Be recognized as a local supporter by posting your company logo on the local chapter page(Image size for logos: gif, jpg or png with a size of 150px X 45px at 72dpi or 55px X 80px at 72dpi) &lt;br /&gt;
 - Have a table at local chapter meeting &lt;br /&gt;
 - Promote your products and services&lt;br /&gt;
 - Bring a raffle prize to gather business cards&lt;br /&gt;
&lt;br /&gt;
Contact us [[#Los Angeles Chapter]] for general questions relating to sponsorship and donations &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting: Security Summer Social August 22, 2012 at 6:30PM at  The Daily Grill == &lt;br /&gt;
612 S. Flower Street ● Los Angeles, CA 90017&lt;br /&gt;
&lt;br /&gt;
===== Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/65238842/ =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thanks to generous support of our sponsor, Corero Network Security, we&lt;br /&gt;
will be waiving donation requirement. Everyone will receive one free&lt;br /&gt;
drink ticket and we will have hors d'oeuvres for everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Corero Network Security (CNS:LN), an organization’s First Line of&lt;br /&gt;
Defense, is an international network security company and the leading&lt;br /&gt;
provider of Distributed Denial of Service (DDoS) defense and Next&lt;br /&gt;
Generation Intrusion Prevention Systems (NGIPS) solutions. As the&lt;br /&gt;
First Line of Defense, Corero’s products and services stop DDoS&lt;br /&gt;
attacks, protect IT infrastructure and eliminate downtime. Customers&lt;br /&gt;
include enterprises, service providers and government organizations&lt;br /&gt;
worldwide. Corero’s appliance-based solutions are dynamic and&lt;br /&gt;
automatically respond to evolving cyber attacks, known and unknown,&lt;br /&gt;
allowing existing IT infrastructure -- such as firewalls -- to perform&lt;br /&gt;
their intended purposes. Corero’s products are transparent, highly&lt;br /&gt;
scalable and feature the lowest latency and highest reliability in the&lt;br /&gt;
industry. Corero is headquartered in Hudson, Massachusetts with&lt;br /&gt;
offices around the world. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Visit www.corero.com&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
http://www.corero.com/resources/images/grid/logo.gif&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
== Would you like to speak at an OWASP Los Angeles Meeting? == &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
[[Los Angeles/2012 Meetings|2012 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
*[mailto:Kelly.Fitzgerald@owasp.org Kelly Fitzgerald] -- Board Member &lt;br /&gt;
*[mailto:Stuart.Schwartz@owasp.org Stuart Schwartz] -- Board Member &lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Yev Avidon and Mikhael Felker  &amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles chapter was founded by Cassio Goldschmidt. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=134447</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=134447"/>
				<updated>2012-08-17T02:18:35Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
'''Sponsors and Supporters Donate Here:''' &lt;br /&gt;
=====https://www.cvent.com/events/owasp-sponsorship-and-donation/registration-99bc1441e2684ff5b214b0df6b3a9ae3.aspx=====&lt;br /&gt;
&lt;br /&gt;
Single Meeting Supporter:&lt;br /&gt;
Organizations that wish to support the OWASP Los Angeles Chapter with a 100% tax deductible donation  enable the OWASP Foundation to continue its mission &lt;br /&gt;
Get the following benefits::&lt;br /&gt;
 - Meet upwards of 60-70 potential new clients&lt;br /&gt;
 - Be recognized as a local supporter by posting your company logo on the local chapter page(Image size for logos: gif, jpg or png with a size of 150px X 45px at 72dpi or 55px X 80px at 72dpi) &lt;br /&gt;
 - Have a table at local chapter meeting &lt;br /&gt;
 - Promote your products and services&lt;br /&gt;
 - Bring a raffle prize to gather business cards&lt;br /&gt;
&lt;br /&gt;
Contact us [[#Los Angeles Chapter]] for general questions relating to sponsorship and donations &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting: Security Summer Social August 22, 2012 at 6:30PM at  The Daily Grill == &lt;br /&gt;
612 S. Flower Street ● Los Angeles, CA 90017&lt;br /&gt;
&lt;br /&gt;
===== Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/65238842/ =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thanks to generous support of our sponsor, Corero Network Security, we&lt;br /&gt;
will be waiving donation requirement. Everyone will receive one free&lt;br /&gt;
drink ticket and we will have hors d'oeuvres for everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Corero Network Security (CNS:LN), an organization’s First Line of&lt;br /&gt;
Defense, is an international network security company and the leading&lt;br /&gt;
provider of Distributed Denial of Service (DDoS) defense and Next&lt;br /&gt;
Generation Intrusion Prevention Systems (NGIPS) solutions. As the&lt;br /&gt;
First Line of Defense, Corero’s products and services stop DDoS&lt;br /&gt;
attacks, protect IT infrastructure and eliminate downtime. Customers&lt;br /&gt;
include enterprises, service providers and government organizations&lt;br /&gt;
worldwide. Corero’s appliance-based solutions are dynamic and&lt;br /&gt;
automatically respond to evolving cyber attacks, known and unknown,&lt;br /&gt;
allowing existing IT infrastructure -- such as firewalls -- to perform&lt;br /&gt;
their intended purposes. Corero’s products are transparent, highly&lt;br /&gt;
scalable and feature the lowest latency and highest reliability in the&lt;br /&gt;
industry. Corero is headquartered in Hudson, Massachusetts with&lt;br /&gt;
offices around the world. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Visit [www.corero.com]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
http://www.corero.com/resources/images/grid/logo.gif&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
== Would you like to speak at an OWASP Los Angeles Meeting? == &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
[[Los Angeles/2012 Meetings|2012 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
*[mailto:Kelly.Fitzgerald@owasp.org Kelly Fitzgerald] -- Board Member &lt;br /&gt;
*[mailto:Stuart.Schwartz@owasp.org Stuart Schwartz] -- Board Member &lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Yev Avidon and Mikhael Felker  &amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles chapter was founded by Cassio Goldschmidt. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=134446</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=134446"/>
				<updated>2012-08-17T02:16:53Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
'''Sponsors and Supporters Donate Here:''' &lt;br /&gt;
=====https://www.cvent.com/events/owasp-sponsorship-and-donation/registration-99bc1441e2684ff5b214b0df6b3a9ae3.aspx=====&lt;br /&gt;
&lt;br /&gt;
Single Meeting Supporter:&lt;br /&gt;
Organizations that wish to support the OWASP Los Angeles Chapter with a 100% tax deductible donation  enable the OWASP Foundation to continue its mission &lt;br /&gt;
Get the following benefits::&lt;br /&gt;
 - Meet upwards of 60-70 potential new clients&lt;br /&gt;
 - Be recognized as a local supporter by posting your company logo on the local chapter page(Image size for logos: gif, jpg or png with a size of 150px X 45px at 72dpi or 55px X 80px at 72dpi) &lt;br /&gt;
 - Have a table at local chapter meeting &lt;br /&gt;
 - Promote your products and services&lt;br /&gt;
 - Bring a raffle prize to gather business cards&lt;br /&gt;
&lt;br /&gt;
Contact us [[#Los Angeles Chapter]] for general questions relating to sponsorship and donations &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting: Security Summer Social August 22, 2012 at 6:30PM at  The Daily Grill == &lt;br /&gt;
612 S. Flower Street ● Los Angeles, CA 90017&lt;br /&gt;
&lt;br /&gt;
===== Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/65238842/ =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thanks to generous support of our sponsor, Corero Network Security, we&lt;br /&gt;
will be waiving donation requirement. Everyone will receive one free&lt;br /&gt;
drink ticket and we will have hors d'oeuvres for everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Corero Network Security (CNS:LN), an organization’s First Line of&lt;br /&gt;
Defense, is an international network security company and the leading&lt;br /&gt;
provider of Distributed Denial of Service (DDoS) defense and Next&lt;br /&gt;
Generation Intrusion Prevention Systems (NGIPS) solutions. As the&lt;br /&gt;
First Line of Defense, Corero’s products and services stop DDoS&lt;br /&gt;
attacks, protect IT infrastructure and eliminate downtime. Customers&lt;br /&gt;
include enterprises, service providers and government organizations&lt;br /&gt;
worldwide. Corero’s appliance-based solutions are dynamic and&lt;br /&gt;
automatically respond to evolving cyber attacks, known and unknown,&lt;br /&gt;
allowing existing IT infrastructure -- such as firewalls -- to perform&lt;br /&gt;
their intended purposes. Corero’s products are transparent, highly&lt;br /&gt;
scalable and feature the lowest latency and highest reliability in the&lt;br /&gt;
industry. Corero is headquartered in Hudson, Massachusetts with&lt;br /&gt;
offices around the world. www.corero.com.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
== Would you like to speak at an OWASP Los Angeles Meeting? == &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
[[Los Angeles/2012 Meetings|2012 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
*[mailto:Kelly.Fitzgerald@owasp.org Kelly Fitzgerald] -- Board Member &lt;br /&gt;
*[mailto:Stuart.Schwartz@owasp.org Stuart Schwartz] -- Board Member &lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Yev Avidon and Mikhael Felker  &amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles chapter was founded by Cassio Goldschmidt. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=133316</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=133316"/>
				<updated>2012-07-23T04:52:59Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting: August 1, 2012 at 7:00PM. Symantec Offices, Culver City == &lt;br /&gt;
&lt;br /&gt;
[[Please note that our next meeting will be on August 1. &lt;br /&gt;
]]&lt;br /&gt;
===== Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/65238422/ =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
[[Los Angeles/2012 Meetings|2012 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
*[mailto:Kelly.Fitzgerald@owasp.org Kelly Fitzgerald] -- Board Member &lt;br /&gt;
*[mailto:Stuart.Schwartz@owasp.org Stuart Schwartz] -- Board Member &lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Yev Avidon and Mikhael Felker  &amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles chapter was founded by Cassio Goldschmidt. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=133315</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=133315"/>
				<updated>2012-07-23T04:52:05Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting: August 1, 2012 at 7:00PM. Symantec Offices, Culver City == &lt;br /&gt;
&lt;br /&gt;
[[Please note that our next meeting will be on August 1. &lt;br /&gt;
]]&lt;br /&gt;
===== Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/65238422/ =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
[[Los Angeles/2012 Meetings|2012 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
*[mailto:Kelly.Fitzgerald@owasp.org Kelly Fitzgerald] -- Board Member &lt;br /&gt;
*[mailto:Stuart.Schwartz@owasp.org Stuart Schwartz] -- Board Member &lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Yev Avidon and Mikhael Felker  &lt;br /&gt;
Los Angeles was founded by Cassio Goldschmidt. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/2012_Meetings&amp;diff=133314</id>
		<title>Los Angeles/2012 Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2012_Meetings&amp;diff=133314"/>
				<updated>2012-07-23T04:20:39Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''June 27, 2012, Symantec Offices, Culver City'''&lt;br /&gt;
&lt;br /&gt;
'''Flame Malware'''&lt;br /&gt;
&lt;br /&gt;
The discovery of the Flame malware that targets Middle Eastern countries, predominantly Iran, has brought politically motivated threats into the spot light again.&lt;br /&gt;
In this talk I will discuss the Flame malware and contrast it with other politically motivated threats we have seen. I will discuss how Flame was discovered, what it is capable of and give updates on the latest analysis. In addition I will talk about the increasing use of cyber espionage and what that may mean for software developers.&lt;br /&gt;
Flame is peculiar in that it was written with a combination of C++, Lua and sqlite. I will show how the threat uses these technologies and how that differs from the malware we see every day.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Liam O Murchu'''&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is a manager of Security Response at Symantec. He has appeared on CBS 60 Minutes about Stuxnet virus. He has also presented about Stuxnet at Los Angeles chapters of OWASP and ISSA.&lt;br /&gt;
http://www.cbsnews.com/video/watch/?id=7400892n&lt;br /&gt;
&lt;br /&gt;
'''May 23, 2012 at 6:45PM. Symantec Offices, Culver City'''&lt;br /&gt;
&lt;br /&gt;
'''Data Mining a Mountain of Zero Day Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. We used static binary analysis on thousands of applications submitted to us by large enterprises, commercial software vendors, open source projects, and software outsourcers, to create an anonymized vulnerability data set. By mining this data we can answer some interesting questions.&lt;br /&gt;
Which industries have the most secure and least secure code? What types of mistakes do developers make most often? Which languages and platforms have the apps with the most vulnerabilities? Should you be most worried of internally built apps, open source, commercial software, or outsourcers? These questions and many more will be answered as we tunnel through zero day mountain.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Chris Wysopal'''&lt;br /&gt;
&lt;br /&gt;
Chris Wysopal, Veracode’s CTO and Co-Founder, is responsible for the company’s software security analysis capabilities. In 2008 he was named one of InfoWorld's Top 25 CTO's and one of the 100 most influential people in IT by eWeek. One of the original vulnerability researchers and a member of L0pht Heavy Industries, he has testified on Capitol Hill in the US on the subjects of government computer security and how vulnerabilities are discovered in software. He is an author of L0phtCrack and netcat for Windows. He is the lead author of “The Art of Software Security Testing” published by Addison-Wesley.&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=131469</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=131469"/>
				<updated>2012-06-14T18:32:08Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting: June 27, 2012 at 7:00PM. Symantec Offices, Culver City == &lt;br /&gt;
&lt;br /&gt;
Please note that our next meeting will be on August 1. &lt;br /&gt;
&lt;br /&gt;
===== Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/65238232/ =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===== Flame Malware =====&lt;br /&gt;
&lt;br /&gt;
The discovery of the Flame malware that targets Middle Eastern countries, predominantly Iran, has brought politically motivated threats into the spot light again.&lt;br /&gt;
&lt;br /&gt;
In this talk I will discuss the Flame malware and contrast it with other politically motivated threats we have seen. I will discuss how Flame was discovered, what it is capable of and give updates on the latest analysis. In addition I will talk about the increasing use of cyber espionage and what that may mean for software developers.&lt;br /&gt;
&lt;br /&gt;
Flame is peculiar in that it was written with a combination of C++, Lua and sqlite. I will show how the threat uses these technologies and how that differs from the malware we see every day.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Speaker: Liam O Murchu =====&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is a manager of Security Response at Symantec. He has appeared on CBS 60 Minutes about Stuxnet virus. He has also presented about Stuxnet at Los Angeles chapters of OWASP and ISSA.&lt;br /&gt;
&lt;br /&gt;
http://www.cbsnews.com/video/watch/?id=7400892n&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
[[Los Angeles/2012 Meetings|2012 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/2012_Meetings&amp;diff=131468</id>
		<title>Los Angeles/2012 Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2012_Meetings&amp;diff=131468"/>
				<updated>2012-06-14T18:29:16Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''May 23, 2012 at 6:45PM. Symantec Offices, Culver City'''&lt;br /&gt;
&lt;br /&gt;
'''Data Mining a Mountain of Zero Day Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. We used static binary analysis on thousands of applications submitted to us by large enterprises, commercial software vendors, open source projects, and software outsourcers, to create an anonymized vulnerability data set. By mining this data we can answer some interesting questions.&lt;br /&gt;
Which industries have the most secure and least secure code? What types of mistakes do developers make most often? Which languages and platforms have the apps with the most vulnerabilities? Should you be most worried of internally built apps, open source, commercial software, or outsourcers? These questions and many more will be answered as we tunnel through zero day mountain.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Chris Wysopal'''&lt;br /&gt;
&lt;br /&gt;
Chris Wysopal, Veracode’s CTO and Co-Founder, is responsible for the company’s software security analysis capabilities. In 2008 he was named one of InfoWorld's Top 25 CTO's and one of the 100 most influential people in IT by eWeek. One of the original vulnerability researchers and a member of L0pht Heavy Industries, he has testified on Capitol Hill in the US on the subjects of government computer security and how vulnerabilities are discovered in software. He is an author of L0phtCrack and netcat for Windows. He is the lead author of “The Art of Software Security Testing” published by Addison-Wesley.&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/2012_Meetings&amp;diff=131467</id>
		<title>Los Angeles/2012 Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2012_Meetings&amp;diff=131467"/>
				<updated>2012-06-14T18:28:51Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: Created page with &amp;quot;'''May 23, 2012 at 6:45PM. Symantec Offices, Culver City '''  '''Data Mining a Mountain of Zero Day Vulnerabilities '''Every day, software developers around the world, from Ba...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''May 23, 2012 at 6:45PM. Symantec Offices, Culver City&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
'''Data Mining a Mountain of Zero Day Vulnerabilities&lt;br /&gt;
'''Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. We used static binary analysis on thousands of applications submitted to us by large enterprises, commercial software vendors, open source projects, and software outsourcers, to create an anonymized vulnerability data set. By mining this data we can answer some interesting questions.&lt;br /&gt;
Which industries have the most secure and least secure code? What types of mistakes do developers make most often? Which languages and platforms have the apps with the most vulnerabilities? Should you be most worried of internally built apps, open source, commercial software, or outsourcers? These questions and many more will be answered as we tunnel through zero day mountain.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Chris Wysopal&lt;br /&gt;
'''Chris Wysopal, Veracode’s CTO and Co-Founder, is responsible for the company’s software security analysis capabilities. In 2008 he was named one of InfoWorld's Top 25 CTO's and one of the 100 most influential people in IT by eWeek. One of the original vulnerability researchers and a member of L0pht Heavy Industries, he has testified on Capitol Hill in the US on the subjects of government computer security and how vulnerabilities are discovered in software. He is an author of L0phtCrack and netcat for Windows. He is the lead author of “The Art of Software Security Testing” published by Addison-Wesley.&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=131466</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=131466"/>
				<updated>2012-06-14T18:28:09Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting: May 23, 2012 at 6:45PM. Symantec Offices, Culver City == &lt;br /&gt;
&lt;br /&gt;
We will have our May monthly as usual this month. Please note that we need to start at 6:45 sharp and Chris's talk will start promptly at 7:00PM as he needs to fly back to the east coast.&lt;br /&gt;
&lt;br /&gt;
===== Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/61886212/ =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===== Data Mining a Mountain of Zero Day Vulnerabilities =====&lt;br /&gt;
&lt;br /&gt;
Every day, software developers around the world, from Bangalore to&lt;br /&gt;
Silicon Valley, churn out millions of lines of insecure code. We used&lt;br /&gt;
static binary analysis on thousands of applications submitted to us by&lt;br /&gt;
large enterprises, commercial software vendors, open source projects,&lt;br /&gt;
and software outsourcers, to create an anonymized vulnerability data&lt;br /&gt;
set. By mining this data we can answer some interesting questions.&lt;br /&gt;
&lt;br /&gt;
Which industries have the most secure and least secure code? What&lt;br /&gt;
types of mistakes do developers make most often? Which languages and&lt;br /&gt;
platforms have the apps with the most vulnerabilities? Should you be&lt;br /&gt;
most worried of internally built apps, open source, commercial&lt;br /&gt;
software, or outsourcers? These questions and many more will be&lt;br /&gt;
answered as we tunnel through zero day mountain.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Speaker: Chris Wysopal =====&lt;br /&gt;
&lt;br /&gt;
Chris Wysopal, Veracode’s CTO and Co-Founder, is responsible for the&lt;br /&gt;
company’s software security analysis capabilities. In 2008 he was&lt;br /&gt;
named one of InfoWorld's Top 25 CTO's and one of the 100 most&lt;br /&gt;
influential people in IT by eWeek. One of the original vulnerability&lt;br /&gt;
researchers and a member of L0pht Heavy Industries, he has testified&lt;br /&gt;
on Capitol Hill in the US on the subjects of government computer&lt;br /&gt;
security and how vulnerabilities are discovered in software. He is an&lt;br /&gt;
author of L0phtCrack and netcat for Windows. He is the lead author of&lt;br /&gt;
“The Art of Software Security Testing” published by Addison-Wesley.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
[[Los Angeles/2012 Meetings|2012 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=130077</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=130077"/>
				<updated>2012-05-17T20:38:10Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting: May 23, 2012 at 6:45PM. Symantec Offices, Culver City == &lt;br /&gt;
&lt;br /&gt;
We will have our May monthly as usual this month. Please note that we need to start at 6:45 sharp and Chris's talk will start promptly at 7:00PM as he needs to fly back to the east coast.&lt;br /&gt;
&lt;br /&gt;
===== Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/61886212/ =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===== Data Mining a Mountain of Zero Day Vulnerabilities =====&lt;br /&gt;
&lt;br /&gt;
Every day, software developers around the world, from Bangalore to&lt;br /&gt;
Silicon Valley, churn out millions of lines of insecure code. We used&lt;br /&gt;
static binary analysis on thousands of applications submitted to us by&lt;br /&gt;
large enterprises, commercial software vendors, open source projects,&lt;br /&gt;
and software outsourcers, to create an anonymized vulnerability data&lt;br /&gt;
set. By mining this data we can answer some interesting questions.&lt;br /&gt;
&lt;br /&gt;
Which industries have the most secure and least secure code? What&lt;br /&gt;
types of mistakes do developers make most often? Which languages and&lt;br /&gt;
platforms have the apps with the most vulnerabilities? Should you be&lt;br /&gt;
most worried of internally built apps, open source, commercial&lt;br /&gt;
software, or outsourcers? These questions and many more will be&lt;br /&gt;
answered as we tunnel through zero day mountain.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Speaker: Chris Wysopal =====&lt;br /&gt;
&lt;br /&gt;
Chris Wysopal, Veracode’s CTO and Co-Founder, is responsible for the&lt;br /&gt;
company’s software security analysis capabilities. In 2008 he was&lt;br /&gt;
named one of InfoWorld's Top 25 CTO's and one of the 100 most&lt;br /&gt;
influential people in IT by eWeek. One of the original vulnerability&lt;br /&gt;
researchers and a member of L0pht Heavy Industries, he has testified&lt;br /&gt;
on Capitol Hill in the US on the subjects of government computer&lt;br /&gt;
security and how vulnerabilities are discovered in software. He is an&lt;br /&gt;
author of L0phtCrack and netcat for Windows. He is the lead author of&lt;br /&gt;
“The Art of Software Security Testing” published by Addison-Wesley.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=130076</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=130076"/>
				<updated>2012-05-17T20:36:44Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We will have our May monthly as usual this month. Please note that we need to start at 6:45 sharp and Chris's talk will start promptly at 7:00PM as he needs to fly back to the east coast.&lt;br /&gt;
&lt;br /&gt;
===== Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/61886212/ =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===== Data Mining a Mountain of Zero Day Vulnerabilities =====&lt;br /&gt;
&lt;br /&gt;
Every day, software developers around the world, from Bangalore to&lt;br /&gt;
Silicon Valley, churn out millions of lines of insecure code. We used&lt;br /&gt;
static binary analysis on thousands of applications submitted to us by&lt;br /&gt;
large enterprises, commercial software vendors, open source projects,&lt;br /&gt;
and software outsourcers, to create an anonymized vulnerability data&lt;br /&gt;
set. By mining this data we can answer some interesting questions.&lt;br /&gt;
&lt;br /&gt;
Which industries have the most secure and least secure code? What&lt;br /&gt;
types of mistakes do developers make most often? Which languages and&lt;br /&gt;
platforms have the apps with the most vulnerabilities? Should you be&lt;br /&gt;
most worried of internally built apps, open source, commercial&lt;br /&gt;
software, or outsourcers? These questions and many more will be&lt;br /&gt;
answered as we tunnel through zero day mountain.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Speaker: Chris Wysopal =====&lt;br /&gt;
&lt;br /&gt;
Chris Wysopal, Veracode’s CTO and Co-Founder, is responsible for the&lt;br /&gt;
company’s software security analysis capabilities. In 2008 he was&lt;br /&gt;
named one of InfoWorld's Top 25 CTO's and one of the 100 most&lt;br /&gt;
influential people in IT by eWeek. One of the original vulnerability&lt;br /&gt;
researchers and a member of L0pht Heavy Industries, he has testified&lt;br /&gt;
on Capitol Hill in the US on the subjects of government computer&lt;br /&gt;
security and how vulnerabilities are discovered in software. He is an&lt;br /&gt;
author of L0phtCrack and netcat for Windows. He is the lead author of&lt;br /&gt;
“The Art of Software Security Testing” published by Addison-Wesley.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=130075</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=130075"/>
				<updated>2012-05-17T20:21:31Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We will have our May monthly as usual this month. Please note that we need to start at 6:45 sharp and Chris's talk will start promptly at 7:00PM as he needs to fly back to the east coast.&lt;br /&gt;
&lt;br /&gt;
Please RSVP here: http://www.meetup.com/OWASP-Los-Angeles/events/61886212/&lt;br /&gt;
&lt;br /&gt;
Data Mining a Mountain of Zero Day Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Every day, software developers around the world, from Bangalore to&lt;br /&gt;
Silicon Valley, churn out millions of lines of insecure code. We used&lt;br /&gt;
static binary analysis on thousands of applications submitted to us by&lt;br /&gt;
large enterprises, commercial software vendors, open source projects,&lt;br /&gt;
and software outsourcers, to create an anonymized vulnerability data&lt;br /&gt;
set. By mining this data we can answer some interesting questions.&lt;br /&gt;
&lt;br /&gt;
Which industries have the most secure and least secure code? What&lt;br /&gt;
types of mistakes do developers make most often? Which languages and&lt;br /&gt;
platforms have the apps with the most vulnerabilities? Should you be&lt;br /&gt;
most worried of internally built apps, open source, commercial&lt;br /&gt;
software, or outsourcers? These questions and many more will be&lt;br /&gt;
answered as we tunnel through zero day mountain.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Chris Wysopal, Veracode’s CTO and Co-Founder, is responsible for the&lt;br /&gt;
company’s software security analysis capabilities. In 2008 he was&lt;br /&gt;
named one of InfoWorld's Top 25 CTO's and one of the 100 most&lt;br /&gt;
influential people in IT by eWeek. One of the original vulnerability&lt;br /&gt;
researchers and a member of L0pht Heavy Industries, he has testified&lt;br /&gt;
on Capitol Hill in the US on the subjects of government computer&lt;br /&gt;
security and how vulnerabilities are discovered in software. He is an&lt;br /&gt;
author of L0phtCrack and netcat for Windows. He is the lead author of&lt;br /&gt;
“The Art of Software Security Testing” published by Addison-Wesley.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=127322</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=127322"/>
				<updated>2012-04-03T00:42:09Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; April 25, 2012, 3:00 PM &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
At a hotel in Culver City.&lt;br /&gt;
&lt;br /&gt;
Exact location to be announced.&lt;br /&gt;
&lt;br /&gt;
RSVP will open soon at http://www.meetup.com/OWASP-Los-Angeles/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== April message from OWASP Los Angeles &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;1. Hold the Date -- April 25 &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We are planning for 1/2 day conference on April 25 -- calling it a Mini-Summit -- starting at 3PM at a hotel on the west side (most likely in Culver City). We have at least 3 speakers and a panel discussion. The event includes food and beverages and there will be a small fee (no more than $20) to offset the cost. &lt;br /&gt;
&lt;br /&gt;
Please show us love by registering. Registration will open soon on Meetup. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; 2. Participate in Projects &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
OWASP is about projects. Without projects, OWASP wouldn't exist, and projects need new blood. I would like to encourage your participation in the projects. There are many projects to choose from (link below) but  testing, development and code review guides are in urgent need of help. You don't need to be a coder to contribute. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project&lt;br /&gt;
&lt;br /&gt;
Please see what you can contribute and feel free to reach out to the project leaders directly, or send me an email if you want an introduction. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; 3. Call for Local Speakers &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We have a lot of security talent in LA area and we would love to hear from you. Edward Bonver is leading an initiative to have local speakers more involved and present at OWASP meetings. Please reach out to him at edward@owasp.org if you're interested. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=127321</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=127321"/>
				<updated>2012-04-03T00:39:26Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Mar 21, 2012, 6:30 PM &amp;lt;br&amp;gt; ==&lt;br /&gt;
&amp;lt;!-- (Note different date, time and location)&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
At a hotel in Culver City.&lt;br /&gt;
&lt;br /&gt;
Exact location to be announced.&lt;br /&gt;
&lt;br /&gt;
RSVP will open soon at http://www.meetup.com/OWASP-Los-Angeles/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== April message from OWASP Los Angeles President &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;1. Hold the Date -- April 25 &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We are planning for 1/2 day conference on April 25 -- calling it a Mini-Summit -- starting at 3PM at a hotel on the west side (most likely in Culver City). We have at least 3 speakers and a panel discussion. The event includes food and beverages and there will be a small fee (no more than $20) to offset the cost. &lt;br /&gt;
&lt;br /&gt;
Please show us love by registering. Registration will open soon on Meetup. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; 2. Participate in Projects &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
OWASP is about projects. Without projects, OWASP wouldn't exist, and projects need new blood. I would like to encourage your participation in the projects. There are many projects to choose from (link below) but  testing, development and code review guides are in urgent need of help. You don't need to be a coder to contribute. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project&lt;br /&gt;
&lt;br /&gt;
Please see what you can contribute and feel free to reach out to the project leaders directly, or send me an email if you want an introduction. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; 3. Call for Local Speakers &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We have a lot of security talent in LA area and we would love to hear from you. Edward Bonver is leading an initiative to have local speakers more involved and present at OWASP meetings. Please reach out to him at edward@owasp.org if you're interested. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=127320</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=127320"/>
				<updated>2012-04-03T00:38:24Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Mar 21, 2012, 6:30 PM &amp;lt;br&amp;gt; ==&lt;br /&gt;
&amp;lt;!-- (Note different date, time and location)&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
At a hotel in Culver City.&lt;br /&gt;
&lt;br /&gt;
Exact location to be announced.&lt;br /&gt;
&lt;br /&gt;
RSVP will open soon at http://www.meetup.com/OWASP-Los-Angeles/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== April message from OWASP Los Angeles President ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;1. Hold the Date -- April 25 &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We are planning for 1/2 day conference on April 25 -- calling it a Mini-Summit -- starting at 3PM at a hotel on the west side (most likely in Culver City). We have at least 3 speakers and a panel discussion. The event includes food and beverages and there will be a small fee (no more than $20) to offset the cost. &lt;br /&gt;
&lt;br /&gt;
Please show us love by registering. Registration will open soon on Meetup. &lt;br /&gt;
&lt;br /&gt;
2. Participate in Projects &lt;br /&gt;
&lt;br /&gt;
OWASP is about projects. Without projects, OWASP wouldn't exist, and projects need new blood. I would like to encourage your participation in the projects. There are many projects to choose from (link below) but  testing, development and code review guides are in urgent need of help. You don't need to be a coder to contribute. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project&lt;br /&gt;
&lt;br /&gt;
Please see what you can contribute and feel free to reach out to the project leaders directly, or send me an email if you want an introduction. &lt;br /&gt;
&lt;br /&gt;
3. Call for Local Speakers &lt;br /&gt;
&lt;br /&gt;
We have a lot of security talent in LA area and we would love to hear from you. Edward Bonver is leading an initiative to have local speakers more involved and present at OWASP meetings. Please reach out to him at edward@owasp.org if you're interested. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=127319</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=127319"/>
				<updated>2012-04-03T00:37:20Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Mar 21, 2012, 6:30 PM &amp;lt;br&amp;gt; ==&lt;br /&gt;
&amp;lt;!-- (Note different date, time and location)&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
At a hotel in Culver City.&lt;br /&gt;
&lt;br /&gt;
Exact location to be announced.&lt;br /&gt;
&lt;br /&gt;
RSVP will open soon at http://www.meetup.com/OWASP-Los-Angeles/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== April message from OWASP Los Angeles President &lt;br /&gt;
&lt;br /&gt;
1. Hold the Date -- April 25&lt;br /&gt;
&lt;br /&gt;
We are planning for 1/2 day conference on April 25 -- calling it a Mini-Summit -- starting at 3PM at a hotel on the west side (most likely in Culver City). We have at least 3 speakers and a panel discussion. The event includes food and beverages and there will be a small fee (no more than $20) to offset the cost. &lt;br /&gt;
&lt;br /&gt;
Please show us love by registering. Registration will open soon on Meetup. &lt;br /&gt;
&lt;br /&gt;
2. Participate in Projects &lt;br /&gt;
&lt;br /&gt;
OWASP is about projects. Without projects, OWASP wouldn't exist, and projects need new blood. I would like to encourage your participation in the projects. There are many projects to choose from (link below) but  testing, development and code review guides are in urgent need of help. You don't need to be a coder to contribute. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project&lt;br /&gt;
&lt;br /&gt;
Please see what you can contribute and feel free to reach out to the project leaders directly, or send me an email if you want an introduction. &lt;br /&gt;
&lt;br /&gt;
3. Call for Local Speakers &lt;br /&gt;
&lt;br /&gt;
We have a lot of security talent in LA area and we would love to hear from you. Edward Bonver is leading an initiative to have local speakers more involved and present at OWASP meetings. Please reach out to him at edward@owasp.org if you're interested. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_12&amp;diff=123489</id>
		<title>Global Conferences Committee - Application 12</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_12&amp;diff=123489"/>
				<updated>2012-01-30T23:30:49Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Lorna Alamri.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Connections Committee, OWASP Newsletter, Industry Committee, Summit 2010, AppSecUSA 2011.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Josh Sokol&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Chair of OWASP Global Chapters Committee, Austin Chapter Leader, AppSec USA 2012 Co-Chair&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Lorna is an awesome person and has historically been a huge contributor to OWASP in many different roles.  I believe she would make an amazing addition to the Global Conferences Committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Martin Knobloch&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chair of the Global Education Committee, Netherlands Chapter Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Lorna has proven her worth to the OWASP community previously many times. Not least during the organisation of the AppSec-USA 2011!&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Tin Zaw&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Los Angeles Chapter Leader, Co-Chair AppSec USA 2010&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Lorna, along with Adam and Sarah, has done a great job of organizing AppSec USA 2011. She will be a great asset for the conference committee. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122641</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122641"/>
				<updated>2012-01-11T00:27:21Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, January 25, 2012 7:00 P.M.&amp;amp;nbsp;- 9:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&amp;lt;!-- (Note different date, time and location)&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Great talks and free catered dinner for all attendees.&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://www.meetup.com/OWASP-Los-Angeles/events/47403862/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Topic: Security in the Cloud  ====&lt;br /&gt;
&lt;br /&gt;
It is no surprise that the emergence of cloud computing and&lt;br /&gt;
virtualization are creating a noticeable buzz across the IT space.&lt;br /&gt;
Still, the cloud by itself is a mystery to many customers.  When&lt;br /&gt;
information security is introduced to the mix, the picture becomes&lt;br /&gt;
Cloudy.  Add compliance requirements such as PCI, and it's downright&lt;br /&gt;
Stormy!  In this presentation, Mr. Zigweid will discuss ways to&lt;br /&gt;
achieve data security in a cloud environment.  This includes what a&lt;br /&gt;
cloud customer should watch out for and what they should expect from&lt;br /&gt;
their provider in order to meet compliance requirements.&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Robert Zigweid   ====&lt;br /&gt;
&lt;br /&gt;
Robert Zigweid is an accomplished developer and application tester&lt;br /&gt;
with advanced skills in the creation and analysis of systems&lt;br /&gt;
architecture and threat modeling. As a Senior Security Consultant at&lt;br /&gt;
IOActive, he works with clients to discover and solve network and&lt;br /&gt;
application problems that threaten their business goals and assets. In&lt;br /&gt;
addition to his direct efforts on penetration tests, security reviews,&lt;br /&gt;
and network and application audits, Zigweid contributes to the&lt;br /&gt;
advancement of more stable, secure systems through his research and&lt;br /&gt;
development. He was a co-founder of OSJava, is working on a JDBC&lt;br /&gt;
driver and more robust Java class loader, and has conducted&lt;br /&gt;
groundbreaking research that will further the formal understanding of&lt;br /&gt;
application and network security for audiences at varying levels of&lt;br /&gt;
technical fluency.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=122640</id>
		<title>Los Angeles/2011 Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=122640"/>
				<updated>2012-01-11T00:26:14Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== [[Los_Angeles/2011_Meetings/December_14|December 14, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Great networking reception at Dail Grill in downtown Los Angeles. &lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/November_30|November 30, 2011]] ==&lt;br /&gt;
Speaker:  Mani Tadayon and Tin Zaw&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Cucumber and friends: tools for security that matters&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: http://bit.ly/securitythatmatters&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker:  Neil Matatall&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: passw3rd: friends don't let friends store passwords in source code&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Meeting Sponsor: AlgoSec&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/October_26|October 26, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker:  Muhammad Omar Khan&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Time Based SQL Injections &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker: Jim Manico&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Scalable Web AppSec&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Meeting Sponsor: WhiteHat Security &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/September_28|September 28, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker:  Jim Manico&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Deep XSS Defense&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: PKWARE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/August_24|August 24, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker 1:  Dr. Dan Manson&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 1: Cyber Challenge Program&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Speaker 2:  Jason Taylor&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 2: OWASP Exams Project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: Sprint&lt;br /&gt;
&lt;br /&gt;
== July 27, 2011 ==&lt;br /&gt;
&lt;br /&gt;
Social hour hosted by OWASP LA&amp;lt;br&amp;gt;&lt;br /&gt;
Downtown Daily Grill&amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles, CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/June_22|June 22, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Brian Chess&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Gray, the new Black: Gray-Box Web Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Safenet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/May_25|May 25, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Collins&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Automated Detection of Security Flaws in Ruby on Rails Code&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Justin_Collins-OWASPLA-Brakeman.pdf| Brakeman Presentation]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor:  En Pointe Technologies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/April_27|April 27, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Bryan Sullivan&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: NoSQL Security&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Business Partner Solutions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/March_16|March 16, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Liam O Murchu&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: STUXNET&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsors: Evolve Technology Group, Websense&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/February 23|February 23, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Scott Sutherland&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Database Security in the Real World&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: NetSpi&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/January_26|January 26, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Samy Kamkar&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Evercookie: the Persistent Cookie&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: IBM&amp;amp;nbsp;Rational Software&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122639</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122639"/>
				<updated>2012-01-11T00:24:39Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, January 25, 2012 7:00 P.M.&amp;amp;nbsp;- 9:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Great talks and free catered dinner for all attendees.&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://www.meetup.com/OWASP-Los-Angeles/events/47403862/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Topic: Security in the Cloud  ====&lt;br /&gt;
&lt;br /&gt;
It is no surprise that the emergence of cloud computing and&lt;br /&gt;
virtualization are creating a noticeable buzz across the IT space.&lt;br /&gt;
Still, the cloud by itself is a mystery to many customers.  When&lt;br /&gt;
information security is introduced to the mix, the picture becomes&lt;br /&gt;
Cloudy.  Add compliance requirements such as PCI, and it's downright&lt;br /&gt;
Stormy!  In this presentation, Mr. Zigweid will discuss ways to&lt;br /&gt;
achieve data security in a cloud environment.  This includes what a&lt;br /&gt;
cloud customer should watch out for and what they should expect from&lt;br /&gt;
their provider in order to meet compliance requirements.&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Robert Zigweid   ====&lt;br /&gt;
&lt;br /&gt;
Robert Zigweid is an accomplished developer and application tester&lt;br /&gt;
with advanced skills in the creation and analysis of systems&lt;br /&gt;
architecture and threat modeling. As a Senior Security Consultant at&lt;br /&gt;
IOActive, he works with clients to discover and solve network and&lt;br /&gt;
application problems that threaten their business goals and assets. In&lt;br /&gt;
addition to his direct efforts on penetration tests, security reviews,&lt;br /&gt;
and network and application audits, Zigweid contributes to the&lt;br /&gt;
advancement of more stable, secure systems through his research and&lt;br /&gt;
development. He was a co-founder of OSJava, is working on a JDBC&lt;br /&gt;
driver and more robust Java class loader, and has conducted&lt;br /&gt;
groundbreaking research that will further the formal understanding of&lt;br /&gt;
application and network security for audiences at varying levels of&lt;br /&gt;
technical fluency.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122638</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122638"/>
				<updated>2012-01-11T00:21:43Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, January 25, 2012 7:00 P.M.&amp;amp;nbsp;- 9:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Great talks and free catered dinner for all attendees.&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://www.meetup.com/OWASP-Los-Angeles/events/47403862/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Topic: Security in the Cloud  ====&lt;br /&gt;
&lt;br /&gt;
It is no surprise that the emergence of cloud computing and&lt;br /&gt;
virtualization are creating a noticeable buzz across the IT space.&lt;br /&gt;
Still, the cloud by itself is a mystery to many customers.  When&lt;br /&gt;
information security is introduced to the mix, the picture becomes&lt;br /&gt;
Cloudy.  Add compliance requirements such as PCI, and it's downright&lt;br /&gt;
Stormy!  In this presentation, Mr. Zigweid will discuss ways to&lt;br /&gt;
achieve data security in a cloud environment.  This includes what a&lt;br /&gt;
cloud customer should watch out for and what they should expect from&lt;br /&gt;
their provider in order to meet compliance requirements.&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Robert Zigweid   ====&lt;br /&gt;
&lt;br /&gt;
Robert Zigweid is an accomplished developer and application tester&lt;br /&gt;
with advanced skills in the creation and analysis of systems&lt;br /&gt;
architecture and threat modeling. As a Senior Security Consultant at&lt;br /&gt;
IOActive, he works with clients to discover and solve network and&lt;br /&gt;
application problems that threaten their business goals and assets. In&lt;br /&gt;
addition to his direct efforts on penetration tests, security reviews,&lt;br /&gt;
and network and application audits, Zigweid contributes to the&lt;br /&gt;
advancement of more stable, secure systems through his research and&lt;br /&gt;
development. He was a co-founder of OSJava, is working on a JDBC&lt;br /&gt;
driver and more robust Java class loader, and has conducted&lt;br /&gt;
groundbreaking research that will further the formal understanding of&lt;br /&gt;
application and network security for audiences at varying levels of&lt;br /&gt;
technical fluency.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122637</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122637"/>
				<updated>2012-01-11T00:19:40Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We are on Meetup. Please join our community there. http://www.meetup.com/OWASP-Los-Angeles/&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, January 25, 2012 7:00 P.M.&amp;amp;nbsp;- 9:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Great talks and free catered dinner for all attendees.&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://www.meetup.com/OWASP-Los-Angeles/events/47403862/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Topic: Security in the Cloud  ====&lt;br /&gt;
&lt;br /&gt;
It is no surprise that the emergence of cloud computing and&lt;br /&gt;
virtualization are creating a noticeable buzz across the IT space.&lt;br /&gt;
Still, the cloud by itself is a mystery to many customers.  When&lt;br /&gt;
information security is introduced to the mix, the picture becomes&lt;br /&gt;
Cloudy.  Add compliance requirements such as PCI, and it's downright&lt;br /&gt;
Stormy!  In this presentation, Mr. Zigweid will discuss ways to&lt;br /&gt;
achieve data security in a cloud environment.  This includes what a&lt;br /&gt;
cloud customer should watch out for and what they should expect from&lt;br /&gt;
their provider in order to meet compliance requirements.&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Robert Zigweid   ====&lt;br /&gt;
&lt;br /&gt;
Robert Zigweid is an accomplished developer and application tester&lt;br /&gt;
with advanced skills in the creation and analysis of systems&lt;br /&gt;
architecture and threat modeling. As a Senior Security Consultant at&lt;br /&gt;
IOActive, he works with clients to discover and solve network and&lt;br /&gt;
application problems that threaten their business goals and assets. In&lt;br /&gt;
addition to his direct efforts on penetration tests, security reviews,&lt;br /&gt;
and network and application audits, Zigweid contributes to the&lt;br /&gt;
advancement of more stable, secure systems through his research and&lt;br /&gt;
development. He was a co-founder of OSJava, is working on a JDBC&lt;br /&gt;
driver and more robust Java class loader, and has conducted&lt;br /&gt;
groundbreaking research that will further the formal understanding of&lt;br /&gt;
application and network security for audiences at varying levels of&lt;br /&gt;
technical fluency.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122626</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=122626"/>
				<updated>2012-01-10T20:14:06Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
==== No Speaker this month: Just a Great Networking Event!&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&lt;br /&gt;
This holiday reception is made possible by generous support from&lt;br /&gt;
NT Objectives (http://www.ntobjectives.com/) and FireEye&lt;br /&gt;
(http://www.fireeye.com/).&lt;br /&gt;
&lt;br /&gt;
'''NT OBJECTives''' (NTO), based in Orange County, California,&lt;br /&gt;
bringstogether an innovative collection of top experts in&lt;br /&gt;
informationsecurity and software engineering to develop and provide&lt;br /&gt;
acomprehensive suite of industry-leading technologies and services&lt;br /&gt;
tosolve the application security challenges of today's&lt;br /&gt;
globalorganizations. NTO has created the industry leading,&lt;br /&gt;
automatedtechnology capable of performing comprehensive and accurate&lt;br /&gt;
WebApplication security scanning solutions. Its&lt;br /&gt;
next-generationtechnology, coupled with continued innovation puts NTO&lt;br /&gt;
in a leadershiprole in this area of expertise.&lt;br /&gt;
&lt;br /&gt;
http://www.ntobjectives.com/images/header_logo.jpg&lt;br /&gt;
&lt;br /&gt;
'''FireEye''' is the leading provider of next-generation threat protection&lt;br /&gt;
focused on combating advanced malware, zero-day, and targeted advanced&lt;br /&gt;
persistent threat (APT) attacks. FireEye's solutions supplement&lt;br /&gt;
security defenses such as traditional and next-generation firewalls,&lt;br /&gt;
IPS, antivirus and Web gateways, which can't stop advanced malware.&lt;br /&gt;
These technologies leave significant security holes in the majority of&lt;br /&gt;
corporate networks. FireEye's Malware Protection Systems feature both&lt;br /&gt;
inbound and outbound protection and a signature-less analysis engine&lt;br /&gt;
that utilizes the most sophisticated virtual execution engine in the&lt;br /&gt;
world to stop advanced threats that attack over Web and email.&lt;br /&gt;
&lt;br /&gt;
http://www.fireeye.com/images/logo.png&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121983</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121983"/>
				<updated>2011-12-29T19:30:42Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
==== No Speaker this month: Just a Great Networking Event!&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&lt;br /&gt;
This holiday reception is made possible by generous support from&lt;br /&gt;
NT Objectives (http://www.ntobjectives.com/) and FireEye&lt;br /&gt;
(http://www.fireeye.com/).&lt;br /&gt;
&lt;br /&gt;
'''NT OBJECTives''' (NTO), based in Orange County, California,&lt;br /&gt;
bringstogether an innovative collection of top experts in&lt;br /&gt;
informationsecurity and software engineering to develop and provide&lt;br /&gt;
acomprehensive suite of industry-leading technologies and services&lt;br /&gt;
tosolve the application security challenges of today's&lt;br /&gt;
globalorganizations. NTO has created the industry leading,&lt;br /&gt;
automatedtechnology capable of performing comprehensive and accurate&lt;br /&gt;
WebApplication security scanning solutions. Its&lt;br /&gt;
next-generationtechnology, coupled with continued innovation puts NTO&lt;br /&gt;
in a leadershiprole in this area of expertise.&lt;br /&gt;
&lt;br /&gt;
http://www.ntobjectives.com/images/header_logo.jpg&lt;br /&gt;
&lt;br /&gt;
'''FireEye''' is the leading provider of next-generation threat protection&lt;br /&gt;
focused on combating advanced malware, zero-day, and targeted advanced&lt;br /&gt;
persistent threat (APT) attacks. FireEye's solutions supplement&lt;br /&gt;
security defenses such as traditional and next-generation firewalls,&lt;br /&gt;
IPS, antivirus and Web gateways, which can't stop advanced malware.&lt;br /&gt;
These technologies leave significant security holes in the majority of&lt;br /&gt;
corporate networks. FireEye's Malware Protection Systems feature both&lt;br /&gt;
inbound and outbound protection and a signature-less analysis engine&lt;br /&gt;
that utilizes the most sophisticated virtual execution engine in the&lt;br /&gt;
world to stop advanced threats that attack over Web and email.&lt;br /&gt;
&lt;br /&gt;
http://www.fireeye.com/images/logo.png&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121439</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121439"/>
				<updated>2011-12-13T20:30:20Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
==== No Speaker this month: Just a Great Networking Event!&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&lt;br /&gt;
This holiday reception is made possible by generous support from&lt;br /&gt;
NT Objectives (http://www.ntobjectives.com/) and FireEye&lt;br /&gt;
(http://www.fireeye.com/).&lt;br /&gt;
&lt;br /&gt;
'''NT OBJECTives''' (NTO), based in Orange County, California,&lt;br /&gt;
bringstogether an innovative collection of top experts in&lt;br /&gt;
informationsecurity and software engineering to develop and provide&lt;br /&gt;
acomprehensive suite of industry-leading technologies and services&lt;br /&gt;
tosolve the application security challenges of today's&lt;br /&gt;
globalorganizations. NTO has created the industry leading,&lt;br /&gt;
automatedtechnology capable of performing comprehensive and accurate&lt;br /&gt;
WebApplication security scanning solutions. Its&lt;br /&gt;
next-generationtechnology, coupled with continued innovation puts NTO&lt;br /&gt;
in a leadershiprole in this area of expertise.&lt;br /&gt;
&lt;br /&gt;
http://www.ntobjectives.com/images/header_logo.jpg&lt;br /&gt;
&lt;br /&gt;
'''FireEye''' is the leading provider of next-generation threat protection&lt;br /&gt;
focused on combating advanced malware, zero-day, and targeted advanced&lt;br /&gt;
persistent threat (APT) attacks. FireEye's solutions supplement&lt;br /&gt;
security defenses such as traditional and next-generation firewalls,&lt;br /&gt;
IPS, antivirus and Web gateways, which can't stop advanced malware.&lt;br /&gt;
These technologies leave significant security holes in the majority of&lt;br /&gt;
corporate networks. FireEye's Malware Protection Systems feature both&lt;br /&gt;
inbound and outbound protection and a signature-less analysis engine&lt;br /&gt;
that utilizes the most sophisticated virtual execution engine in the&lt;br /&gt;
world to stop advanced threats that attack over Web and email.&lt;br /&gt;
&lt;br /&gt;
http://www.fireeye.com/images/logo.png&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121438</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121438"/>
				<updated>2011-12-13T20:29:34Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
==== No Speaker this month: Just a Great Networking Event!&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&lt;br /&gt;
This holiday reception is made possible by generous support from&lt;br /&gt;
NTObjectives (http://www.ntobjectives.com/) and FireEye&lt;br /&gt;
(http://www.fireeye.com/).&lt;br /&gt;
&lt;br /&gt;
'''NT OBJECTives''' (NTO), based in Orange County, California,&lt;br /&gt;
bringstogether an innovative collection of top experts in&lt;br /&gt;
informationsecurity and software engineering to develop and provide&lt;br /&gt;
acomprehensive suite of industry-leading technologies and services&lt;br /&gt;
tosolve the application security challenges of today's&lt;br /&gt;
globalorganizations. NTO has created the industry leading,&lt;br /&gt;
automatedtechnology capable of performing comprehensive and accurate&lt;br /&gt;
WebApplication security scanning solutions. Its&lt;br /&gt;
next-generationtechnology, coupled with continued innovation puts NTO&lt;br /&gt;
in a leadershiprole in this area of expertise.&lt;br /&gt;
&lt;br /&gt;
http://www.ntobjectives.com/images/header_logo.jpg&lt;br /&gt;
&lt;br /&gt;
'''FireEye''' is the leading provider of next-generation threat protection&lt;br /&gt;
focused on combating advanced malware, zero-day, and targeted advanced&lt;br /&gt;
persistent threat (APT) attacks. FireEye's solutions supplement&lt;br /&gt;
security defenses such as traditional and next-generation firewalls,&lt;br /&gt;
IPS, antivirus and Web gateways, which can't stop advanced malware.&lt;br /&gt;
These technologies leave significant security holes in the majority of&lt;br /&gt;
corporate networks. FireEye's Malware Protection Systems feature both&lt;br /&gt;
inbound and outbound protection and a signature-less analysis engine&lt;br /&gt;
that utilizes the most sophisticated virtual execution engine in the&lt;br /&gt;
world to stop advanced threats that attack over Web and email.&lt;br /&gt;
&lt;br /&gt;
http://www.fireeye.com/images/logo.png&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121437</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121437"/>
				<updated>2011-12-13T20:23:42Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
==== No Speaker this month: Just a Great Networking Event!&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsor:   ====&lt;br /&gt;
&lt;br /&gt;
This holiday reception is made possible by generous support from&lt;br /&gt;
NTObjectives (http://www.ntobjectives.com/) and FireEye&lt;br /&gt;
(http://www.fireeye.com/).&lt;br /&gt;
&lt;br /&gt;
'''NT OBJECTives''' (NTO), based in Orange County, California,&lt;br /&gt;
bringstogether an innovative collection of top experts in&lt;br /&gt;
informationsecurity and software engineering to develop and provide&lt;br /&gt;
acomprehensive suite of industry-leading technologies and services&lt;br /&gt;
tosolve the application security challenges of today's&lt;br /&gt;
globalorganizations. NTO has created the industry leading,&lt;br /&gt;
automatedtechnology capable of performing comprehensive and accurate&lt;br /&gt;
WebApplication security scanning solutions. Its&lt;br /&gt;
next-generationtechnology, coupled with continued innovation puts NTO&lt;br /&gt;
in a leadershiprole in this area of expertise.&lt;br /&gt;
&lt;br /&gt;
http://www.ntobjectives.com/images/header_logo.jpg&lt;br /&gt;
&lt;br /&gt;
'''FireEye''' is the leading provider of next-generation threat protection&lt;br /&gt;
focused on combating advanced malware, zero-day, and targeted advanced&lt;br /&gt;
persistent threat (APT) attacks. FireEye's solutions supplement&lt;br /&gt;
security defenses such as traditional and next-generation firewalls,&lt;br /&gt;
IPS, antivirus and Web gateways, which can't stop advanced malware.&lt;br /&gt;
These technologies leave significant security holes in the majority of&lt;br /&gt;
corporate networks. FireEye's Malware Protection Systems feature both&lt;br /&gt;
inbound and outbound protection and a signature-less analysis engine&lt;br /&gt;
that utilizes the most sophisticated virtual execution engine in the&lt;br /&gt;
world to stop advanced threats that attack over Web and email.&lt;br /&gt;
&lt;br /&gt;
http://www.fireeye.com/images/logo.png&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
*[mailto:sarah.baso@owasp.org Sarah Baso] -- Chapter Administrator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121434</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121434"/>
				<updated>2011-12-13T19:40:47Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
==== No Speaker this month: Just a Great Networking Event!&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsor:   ====&lt;br /&gt;
&lt;br /&gt;
This holiday reception is made possible by generous support from&lt;br /&gt;
NTObjectives (http://www.ntobjectives.com/) and FireEye&lt;br /&gt;
(http://www.fireeye.com/).&lt;br /&gt;
&lt;br /&gt;
'''NT OBJECTives''' (NTO), based in Orange County, California,&lt;br /&gt;
bringstogether an innovative collection of top experts in&lt;br /&gt;
informationsecurity and software engineering to develop and provide&lt;br /&gt;
acomprehensive suite of industry-leading technologies and services&lt;br /&gt;
tosolve the application security challenges of today's&lt;br /&gt;
globalorganizations. NTO has created the industry leading,&lt;br /&gt;
automatedtechnology capable of performing comprehensive and accurate&lt;br /&gt;
WebApplication security scanning solutions. Its&lt;br /&gt;
next-generationtechnology, coupled with continued innovation puts NTO&lt;br /&gt;
in a leadershiprole in this area of expertise.&lt;br /&gt;
&lt;br /&gt;
'''FireEye''' is the leading provider of next-generation threat protection&lt;br /&gt;
focused on combating advanced malware, zero-day, and targeted advanced&lt;br /&gt;
persistent threat (APT) attacks. FireEye's solutions supplement&lt;br /&gt;
security defenses such as traditional and next-generation firewalls,&lt;br /&gt;
IPS, antivirus and Web gateways, which can't stop advanced malware.&lt;br /&gt;
These technologies leave significant security holes in the majority of&lt;br /&gt;
corporate networks. FireEye's Malware Protection Systems feature both&lt;br /&gt;
inbound and outbound protection and a signature-less analysis engine&lt;br /&gt;
that utilizes the most sophisticated virtual execution engine in the&lt;br /&gt;
world to stop advanced threats that attack over Web and email.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
*[mailto:sarah.baso@owasp.org Sarah Baso] -- Chapter Administrator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121433</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121433"/>
				<updated>2011-12-13T19:40:19Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
==== No Speaker this month: Just a Great Networking Event!&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsor:   ====&lt;br /&gt;
 This holiday reception is made possible by generous support from&lt;br /&gt;
NTObjectives (http://www.ntobjectives.com/) and FireEye&lt;br /&gt;
(http://www.fireeye.com/).&lt;br /&gt;
&lt;br /&gt;
'''NT OBJECTives''' (NTO), based in Orange County, California,&lt;br /&gt;
bringstogether an innovative collection of top experts in&lt;br /&gt;
informationsecurity and software engineering to develop and provide&lt;br /&gt;
acomprehensive suite of industry-leading technologies and services&lt;br /&gt;
tosolve the application security challenges of today's&lt;br /&gt;
globalorganizations. NTO has created the industry leading,&lt;br /&gt;
automatedtechnology capable of performing comprehensive and accurate&lt;br /&gt;
WebApplication security scanning solutions. Its&lt;br /&gt;
next-generationtechnology, coupled with continued innovation puts NTO&lt;br /&gt;
in a leadershiprole in this area of expertise.&lt;br /&gt;
&lt;br /&gt;
'''FireEye''' is the leading provider of next-generation threat protection&lt;br /&gt;
focused on combating advanced malware, zero-day, and targeted advanced&lt;br /&gt;
persistent threat (APT) attacks. FireEye's solutions supplement&lt;br /&gt;
security defenses such as traditional and next-generation firewalls,&lt;br /&gt;
IPS, antivirus and Web gateways, which can't stop advanced malware.&lt;br /&gt;
These technologies leave significant security holes in the majority of&lt;br /&gt;
corporate networks. FireEye's Malware Protection Systems feature both&lt;br /&gt;
inbound and outbound protection and a signature-less analysis engine&lt;br /&gt;
that utilizes the most sophisticated virtual execution engine in the&lt;br /&gt;
world to stop advanced threats that attack over Web and email.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
*[mailto:sarah.baso@owasp.org Sarah Baso] -- Chapter Administrator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121432</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121432"/>
				<updated>2011-12-13T19:39:20Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== No Speaker this month: Just a Great Networking Event!&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsor:   ====&lt;br /&gt;
It's at Daily Grill in downtown Los Angeles. &lt;br /&gt;
 &lt;br /&gt;
This holiday reception is made possible by generous support from&lt;br /&gt;
NTObjectives (http://www.ntobjectives.com/) and FireEye&lt;br /&gt;
(http://www.fireeye.com/).&lt;br /&gt;
&lt;br /&gt;
NT OBJECTives (NTO), based in Orange County, California,&lt;br /&gt;
bringstogether an innovative collection of top experts in&lt;br /&gt;
informationsecurity and software engineering to develop and provide&lt;br /&gt;
acomprehensive suite of industry-leading technologies and services&lt;br /&gt;
tosolve the application security challenges of today's&lt;br /&gt;
globalorganizations. NTO has created the industry leading,&lt;br /&gt;
automatedtechnology capable of performing comprehensive and accurate&lt;br /&gt;
WebApplication security scanning solutions. Its&lt;br /&gt;
next-generationtechnology, coupled with continued innovation puts NTO&lt;br /&gt;
in a leadershiprole in this area of expertise.&lt;br /&gt;
&lt;br /&gt;
FireEye is the leading provider of next-generation threat protection&lt;br /&gt;
focused on combating advanced malware, zero-day, and targeted advanced&lt;br /&gt;
persistent threat (APT) attacks. FireEye's solutions supplement&lt;br /&gt;
security defenses such as traditional and next-generation firewalls,&lt;br /&gt;
IPS, antivirus and Web gateways, which can't stop advanced malware.&lt;br /&gt;
These technologies leave significant security holes in the majority of&lt;br /&gt;
corporate networks. FireEye's Malware Protection Systems feature both&lt;br /&gt;
inbound and outbound protection and a signature-less analysis engine&lt;br /&gt;
that utilizes the most sophisticated virtual execution engine in the&lt;br /&gt;
world to stop advanced threats that attack over Web and email.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
*[mailto:sarah.baso@owasp.org Sarah Baso] -- Chapter Administrator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121207</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121207"/>
				<updated>2011-12-07T21:09:52Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: TBD &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Cassio Goldschmidt&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsor: TBD  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
*[mailto:sarah.baso@owasp.org Sarah Baso] -- Chapter Administrator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121206</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121206"/>
				<updated>2011-12-07T21:09:23Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''''Location:'''''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owasp-december-2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: TBD &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Cassio Goldschmidt&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsor: TBD  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
*[mailto:sarah.baso@owasp.org Sarah Baso] -- Chapter Administrator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121205</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121205"/>
				<updated>2011-12-07T20:49:00Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 6:30 P.M.&amp;amp;nbsp;- 9:30 P.M. &amp;lt;br&amp;gt;&lt;br /&gt;
(Note different date, time and location)&amp;lt;br&amp;gt;  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''''Location:'''''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owaspla-december2011.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: TBD &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Cassio Goldschmidt&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsor: TBD  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
*[mailto:sarah.baso@owasp.org Sarah Baso] -- Chapter Administrator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121204</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=121204"/>
				<updated>2011-12-07T19:34:54Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, December 14, 2011 7:00 P.M.&amp;amp;nbsp;- 9:00 P.M. (Note different date and location)&amp;lt;br&amp;gt;  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Great talks and free catered dinner for all attendees! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''''Location:'''''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://owaspla-december2011.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''OWASP&amp;amp;nbsp;Holiday Gathering''' December 14, 2011 6:30-8:30PM&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''&amp;amp;nbsp; Downtown Daily Grill&amp;lt;br&amp;gt;&amp;amp;nbsp; 612 S. Flower Street • Los Angeles, CA 90017&amp;lt;br&amp;gt;&amp;amp;nbsp; (213) 622-4500 • (213) 629-2974 (fax)&amp;lt;br&amp;gt;&amp;amp;nbsp; downtowndg@dailygrill.com • www.dailygrill.com ''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Topic: TBD &amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Cassio Goldschmidt&amp;lt;br&amp;gt;  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsor: TBD  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
*[mailto:sarah.baso@owasp.org Sarah Baso] -- Chapter Administrator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=121203</id>
		<title>Los Angeles/2011 Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=121203"/>
				<updated>2011-12-07T19:32:12Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== [[Los_Angeles/2011_Meetings/November_30|November 30, 2011]] ==&lt;br /&gt;
Speaker:  Mani Tadayon and Tin Zaw&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Cucumber and friends: tools for security that matters&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: http://bit.ly/securitythatmatters&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker:  Neil Matatall&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: passw3rd: friends don't let friends store passwords in source code&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Meeting Sponsor: AlgoSec&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/October_26|October 26, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker:  Muhammad Omar Khan&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Time Based SQL Injections &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker: Jim Manico&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Scalable Web AppSec&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Meeting Sponsor: WhiteHat Security &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/September_28|September 28, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker:  Jim Manico&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Deep XSS Defense&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: PKWARE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/August_24|August 24, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker 1:  Dr. Dan Manson&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 1: Cyber Challenge Program&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Speaker 2:  Jason Taylor&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 2: OWASP Exams Project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: Sprint&lt;br /&gt;
&lt;br /&gt;
== July 27, 2011 ==&lt;br /&gt;
&lt;br /&gt;
Social hour hosted by OWASP LA&amp;lt;br&amp;gt;&lt;br /&gt;
Downtown Daily Grill&amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles, CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/June_22|June 22, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Brian Chess&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Gray, the new Black: Gray-Box Web Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Safenet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/May_25|May 25, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Collins&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Automated Detection of Security Flaws in Ruby on Rails Code&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Justin_Collins-OWASPLA-Brakeman.pdf| Brakeman Presentation]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor:  En Pointe Technologies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/April_27|April 27, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Bryan Sullivan&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: NoSQL Security&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Business Partner Solutions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/March_16|March 16, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Liam O Murchu&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: STUXNET&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsors: Evolve Technology Group, Websense&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/February 23|February 23, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Scott Sutherland&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Database Security in the Real World&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: NetSpi&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/January_26|January 26, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Samy Kamkar&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Evercookie: the Persistent Cookie&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: IBM&amp;amp;nbsp;Rational Software&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=121202</id>
		<title>Los Angeles/2011 Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=121202"/>
				<updated>2011-12-07T19:31:51Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== [[Los_Angeles/2011_Meetings/November_30|November 30, 2011]] ==&lt;br /&gt;
Speaker:  Mani Tadayon and Tin Zaw&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Cucumber and friends: tools for security that matters&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: http://bit.ly/securitythatmatters&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker:  Neil Matatall&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: passw3rd: friends don't let friends store passwords in source code&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Meeting Sponsor: AlgoSec&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/October_26|October 26, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker:  Muhammad Omar Khan&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Time Based SQL Injections &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker: Jim Manico&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Scalable Web AppSec&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Meeting Sponsor: WhiteHat Security &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/September_28|September 28, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker:  Jim Manico&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Deep XSS Defense&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: PKWARE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/August_24|August 24, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker 1:  Dr. Dan Manson&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 1: Cyber Challenge Program&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Speaker 2:  Jason Taylor&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 2: OWASP Exams Project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: Sprint&lt;br /&gt;
&lt;br /&gt;
== July 27, 2011 ==&lt;br /&gt;
&lt;br /&gt;
Social hour hosted by OWASP LA&amp;lt;br&amp;gt;&lt;br /&gt;
Downtown Daily Grill&amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles, CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/June_22|June 22, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Brian Chess&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Gray, the new Black: Gray-Box Web Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Safenet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/May_25|May 25, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Collins&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Automated Detection of Security Flaws in Ruby on Rails Code&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Justin_Collins-OWASPLA-Brakeman.pdf| Brakeman Presentation]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor:  En Pointe Technologies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/April_27|April 27, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Bryan Sullivan&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: NoSQL Security&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Business Partner Solutions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/March_16|March 16, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Liam O Murchu&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: STUXNET&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsors: Evolve Technology Group, Websense&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/February 23|February 23, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Scott Sutherland&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Database Security in the Real World&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: NetSpi&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/January_26|January 26, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Samy Kamkar&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Evercookie: the Persistent Cookie&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: IBM&amp;amp;nbsp;Rational Software&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=121201</id>
		<title>Los Angeles/2011 Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=121201"/>
				<updated>2011-12-07T19:31:37Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== [[Los_Angeles/2011_Meetings/November_30|November 30, 2011]] ==&lt;br /&gt;
Speaker:  Mani Tadayon and Tin Zaw&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Cucumber and friends: tools for security that matters&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: http://bit.ly/securitythatmatters&lt;br /&gt;
&lt;br /&gt;
Speaker:  Neil Matatall&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: passw3rd: friends don't let friends store passwords in source code&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Meeting Sponsor: AlgoSec&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/October_26|October 26, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker:  Muhammad Omar Khan&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Time Based SQL Injections &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker: Jim Manico&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Scalable Web AppSec&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Meeting Sponsor: WhiteHat Security &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/September_28|September 28, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker:  Jim Manico&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Deep XSS Defense&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: PKWARE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/August_24|August 24, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker 1:  Dr. Dan Manson&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 1: Cyber Challenge Program&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Speaker 2:  Jason Taylor&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 2: OWASP Exams Project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: Sprint&lt;br /&gt;
&lt;br /&gt;
== July 27, 2011 ==&lt;br /&gt;
&lt;br /&gt;
Social hour hosted by OWASP LA&amp;lt;br&amp;gt;&lt;br /&gt;
Downtown Daily Grill&amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles, CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/June_22|June 22, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Brian Chess&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Gray, the new Black: Gray-Box Web Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Safenet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/May_25|May 25, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Collins&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Automated Detection of Security Flaws in Ruby on Rails Code&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Justin_Collins-OWASPLA-Brakeman.pdf| Brakeman Presentation]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor:  En Pointe Technologies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/April_27|April 27, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Bryan Sullivan&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: NoSQL Security&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Business Partner Solutions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/March_16|March 16, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Liam O Murchu&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: STUXNET&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsors: Evolve Technology Group, Websense&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/February 23|February 23, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Scott Sutherland&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Database Security in the Real World&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: NetSpi&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/January_26|January 26, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Samy Kamkar&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Evercookie: the Persistent Cookie&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: IBM&amp;amp;nbsp;Rational Software&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=121200</id>
		<title>Los Angeles/2011 Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/2011_Meetings&amp;diff=121200"/>
				<updated>2011-12-07T19:28:10Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== [[Los_Angeles/2011_Meetings/November_30|November 30, 2011]] ==&lt;br /&gt;
Speaker:  Mani Tadayon and Tin Zaw&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Cucumber and friends: tools for security that matters&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: http://bit.ly/securitythatmatters&lt;br /&gt;
&lt;br /&gt;
Speaker:  Neil Matatall&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: passw3rd: friends don't let friends store passwords in source code&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Meeting Sponsor: AlgoSec&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/October_XX|September XX, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/September_28|September 28, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker:  Jim Manico&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Deep XSS Defense&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: PKWARE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/August_24|August 24, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker 1:  Dr. Dan Manson&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 1: Cyber Challenge Program&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Speaker 2:  Jason Taylor&amp;lt;br&amp;gt;&lt;br /&gt;
Topic 2: OWASP Exams Project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;--&amp;gt;&lt;br /&gt;
Meeting Sponsor: Sprint&lt;br /&gt;
&lt;br /&gt;
== July 27, 2011 ==&lt;br /&gt;
&lt;br /&gt;
Social hour hosted by OWASP LA&amp;lt;br&amp;gt;&lt;br /&gt;
Downtown Daily Grill&amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles, CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/June_22|June 22, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Brian Chess&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Gray, the new Black: Gray-Box Web Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black pptx]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Safenet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/May_25|May 25, 2011]] ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Collins&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Automated Detection of Security Flaws in Ruby on Rails Code&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation: [[Media:Justin_Collins-OWASPLA-Brakeman.pdf| Brakeman Presentation]]&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor:  En Pointe Technologies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/April_27|April 27, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Bryan Sullivan&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: NoSQL Security&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: Business Partner Solutions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/March_16|March 16, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Liam O Murchu&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: STUXNET&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsors: Evolve Technology Group, Websense&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/February 23|February 23, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Scott Sutherland&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Database Security in the Real World&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: NetSpi&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [[Los_Angeles/2011_Meetings/January_26|January 26, 2011]]  ==&lt;br /&gt;
&lt;br /&gt;
Speaker: Samy Kamkar&amp;lt;br&amp;gt;&lt;br /&gt;
Topic: Evercookie: the Persistent Cookie&amp;lt;br&amp;gt;&lt;br /&gt;
Meeting Sponsor: IBM&amp;amp;nbsp;Rational Software&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_15&amp;diff=121049</id>
		<title>Global Industry Committee - Application 15</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_15&amp;diff=121049"/>
				<updated>2011-12-03T20:14:52Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Frank Fan&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP China VP&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Industry Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Helen  Gao&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Long Island Chapter Founder &amp;amp; Leader, Global Membership Comittee&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| I first met Frank at the OWASP conference in 2010. Frank is one of the most intelligent entrepreneurs and infosec experts I have ever met. Frank's company has been one of the main sponsors of the past two OWASP conferences in China. As a matter of fact, Frank has volunteered to host the OWASP submit in 2013. Frank's education and experience in both US and China is rare, especially among OWASP leaders. I am confident that he will be an asset to OWASP.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ivy Zhang&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Member of China Chapter&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Being the VP of China Chapter, Frank also has more than ten years experience in US. His experience and knowledge is crucial in OWASP's mission &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Tin Zaw&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Los Angeles Chapter Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Frank is a highly-respected, well-connected, successful  engineer/businessman in China and he is very committed to success of OWASP, in China and globally. These attributes make him an ideal candidate for the Industry Committee. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_USA_2011_chapters_workshop_agenda&amp;diff=117756</id>
		<title>AppSec USA 2011 chapters workshop agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_USA_2011_chapters_workshop_agenda&amp;diff=117756"/>
				<updated>2011-09-21T15:18:32Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Join Remotely:  https://www3.gotomeeting.com/join/627842590&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
As part of [http://www.appsecusa.org/ AppSec USA 2011], on '''Wednesday, September 21,2011 at 12:00h-15:00h''' at the Minneapolis Convention Center (Room # M101-B), the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
'''Discussion topics include:'''&lt;br /&gt;
* How to improve the current Chapter Leader Handbook?&lt;br /&gt;
* How to start and support new chapters within Canada and the United States?&lt;br /&gt;
* How to support inactive chapters within Canada and the United States?&lt;br /&gt;
* What Governance model is required for OWASP chapters?&lt;br /&gt;
* How can the Global Chapters Committee facilitate the North American chapters?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec USA, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''August 8, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec USA conference.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After August 8, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Proposed agenda (open for discussion): &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Minneapolis Convention Center - Room M101-B&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 12:00 - 12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Welcome and Introductions&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 12:15 - 1:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Handling chapter finances''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All '' &lt;br /&gt;
&lt;br /&gt;
Current chapter handbook [[:Chapter Handbook: Managing Money|section]] to be elaborated. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 1:00 - 1:15&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 1:15 - 2:00&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Top 10 advice for new and veteran chapter leaders''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Create list [https://www.owasp.org/index.php/Talk:AppSec_USA_2011_chapters_workshop_agenda upfront and add action, impact and required support] from the Chapters Committee. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 2:00 - 2:10&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 2:10 - 2:55&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''How to cross-pollinate success among North American chapters?''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Look for good pollinator mechanisms and [https://www.owasp.org/index.php/Talk:AppSec_USA_2011_chapters_workshop_agenda define 7 goals] to be accomplished by AppSec USA 2012 in Austin, Texas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
* Tin Zaw (Global Chapters Committee Chair) - Los Angeles Chapter &lt;br /&gt;
* Sarah Baso (Global Chapters Committee Administrator)&lt;br /&gt;
* Mandeep Khera (Bay Area Chapter Leader and Global Chapter Committee member)&lt;br /&gt;
* Tom Brennan (New York City Metro Leader and International Board of Directors)&lt;br /&gt;
* Kelly Santalucia (New York City Chapter Administrator / Global Membership Committee Administrator)&lt;br /&gt;
* Sherif Koussa (Ottawa Chapter Leader)&lt;br /&gt;
* Brian Van Norman (Cincinnati Chapter)&lt;br /&gt;
* Jon Bango (Atlanta Chapter)&lt;br /&gt;
* James Wickett (Austin Chapter)&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
There will be WiFi, so we can set up a Skype or WebEx conference call for people who want to listen in or participate remotely. &lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso] if you are interested in participating remotely.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapters Workshop at AppSec EU ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Minutes from Workshop]&lt;br /&gt;
&lt;br /&gt;
[[AppSecEU 2011 chapters workshop agenda]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Revising the Chapter Leader Handbook ==&lt;br /&gt;
&lt;br /&gt;
We hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Global_Chapters_Committee]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_USA_2011_chapters_workshop_agenda&amp;diff=117755</id>
		<title>AppSec USA 2011 chapters workshop agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_USA_2011_chapters_workshop_agenda&amp;diff=117755"/>
				<updated>2011-09-21T15:17:34Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Join Remotely:  https://www3.gotomeeting.com/join/627842590&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
As part of [http://www.appsecusa.org/ AppSec USA 2011], on '''Wednesday, September 21,2011 at 12:00h-15:00h''' at the Minneapolis Convention Center (Room # M101-B), the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
'''Discussion topics include:'''&lt;br /&gt;
* How to improve the current Chapter Leader Handbook?&lt;br /&gt;
* How to start and support new chapters within Canada and the United States?&lt;br /&gt;
* How to support inactive chapters within Canada and the United States?&lt;br /&gt;
* What Governance model is required for OWASP chapters?&lt;br /&gt;
* How can the Global Chapters Committee facilitate the North American chapters?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec USA, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''August 8, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec USA conference.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After August 8, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Proposed agenda (open for discussion): &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Minneapolis Convention Center - Room M101-B&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 12:00 - 12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Welcome and Introductions&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 12:15 - 1:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Handling chapter finances''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All '' &lt;br /&gt;
&lt;br /&gt;
Current chapter handbook [[:Chapter Handbook: Managing Money|section]] to be elaborated. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 1:00 - 1:15&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 1:15 - 2:00&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Top 10 advice for new and veteran chapter leaders''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Create list [https://www.owasp.org/index.php/Talk:AppSec_USA_2011_chapters_workshop_agenda upfront and add action, impact and required support] from the Chapters Committee. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 2:00 - 2:10&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 2:10 - 2:55&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''How to cross-pollinate success between Canadian and US chapters?''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Look for good pollinator mechanisms and [https://www.owasp.org/index.php/Talk:AppSec_USA_2011_chapters_workshop_agenda define 7 goals] to be accomplished by AppSec USA 2012 in Austin, Texas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
* Tin Zaw (Global Chapters Committee Chair) - Los Angeles Chapter &lt;br /&gt;
* Sarah Baso (Global Chapters Committee Administrator)&lt;br /&gt;
* Mandeep Khera (Bay Area Chapter Leader and Global Chapter Committee member)&lt;br /&gt;
* Tom Brennan (New York City Metro Leader and International Board of Directors)&lt;br /&gt;
* Kelly Santalucia (New York City Chapter Administrator / Global Membership Committee Administrator)&lt;br /&gt;
* Sherif Koussa (Ottawa Chapter Leader)&lt;br /&gt;
* Brian Van Norman (Cincinnati Chapter)&lt;br /&gt;
* Jon Bango (Atlanta Chapter)&lt;br /&gt;
* James Wickett (Austin Chapter)&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
There will be WiFi, so we can set up a Skype or WebEx conference call for people who want to listen in or participate remotely. &lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso] if you are interested in participating remotely.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapters Workshop at AppSec EU ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Minutes from Workshop]&lt;br /&gt;
&lt;br /&gt;
[[AppSecEU 2011 chapters workshop agenda]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Revising the Chapter Leader Handbook ==&lt;br /&gt;
&lt;br /&gt;
We hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Global_Chapters_Committee]]&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=117301</id>
		<title>How to Join a Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=117301"/>
				<updated>2011-09-13T21:22:10Z</updated>
		
		<summary type="html">&lt;p&gt;Tin Zaw: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Global Committee Pages|Click here to return to the Global Committee Pages]]. &lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Many individuals start with OWASP as a user of a user of tools guides or attending a local chapter. meeting. From that they may become a individual project leader of new tools guides contributing there expertise. Others may choose to become a active chapter leader in a state/region. Becoming a member of one of the Global Committees is not only a great achievement in the technical community, but is an opportunity to directly impact the future of OWASP Foundation globally. As a Global Committee member you are the voice for focus areas and represent the community around the world. The Global Committees ARE designed to develop a committee plan to focus on regional and global areas of improvement. Ideally you nominate a peer as a regional spokesperson and he/she is the conduit for global issues that has approx., 5-10+ hrs per month to volunteer time to OWASP Foundation. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; To encourage focus and participation, we suggest that volunteers contribute to '''ONE PRIMARY COMMITTEE'''. Individuals are '''welcome to participate''' in whatever committee they would like to on efforts, conference calls etc., but may only be officially elected to serve on one committee. &lt;br /&gt;
&lt;br /&gt;
*Note that to prevent conflict of interest, International OWASP Board Members cannot endorse candidates for any committee nor can a committee member endorse a candidate for their own committee. Committee members may endorse candidates for other committees to which they do not belong.&lt;br /&gt;
&lt;br /&gt;
*Committee members who wish to transfer between committees, should discuss this with their current committee first. They must begin a new application for the committee they want to move to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Still have questions - [https://spreadsheets.google.com/a/owasp.org/viewform?hl=en&amp;amp;formkey=dFN1R2NIMTNROXN3dml4ZEcxXzJQYXc6MQ#gid=0 Contact Us] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Fill in one of the below application forms. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Current Committee MEMBERS UNDER ELECTION - APPLICATION FORMS  ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 90%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white; -moz-background-inline-policy: continuous&amp;quot; colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP GLOBAL COMMITTEES - UNDER ELECTION'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 15%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP GLOBAL COMMITTEES''' &lt;br /&gt;
| style=&amp;quot;width: 15%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Global Projects Committee|Projects]]''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Global Membership Committee|Membership]]''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Global Education Committee|Education]]''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Global Conferences Committee|Conferences]]''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Global Industry Committee|Industry]]''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Global Chapter Committee|Chapters]]''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''[[OWASP Connections Committee|Connections]]'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 15%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''Pending Applications -&amp;amp;gt;''' &lt;br /&gt;
| style=&amp;quot;width: 15%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;strike&amp;gt;[[Global Projects and Tools Committee - Application 2|Brad Causey]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 3|Chris Schmidt]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 4|Justin Searle]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 5|Larry Casey]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 6|Keith Turpin]]&amp;lt;/strike&amp;gt;&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 1|Aryavalli Gandhi]]&amp;lt;br&amp;gt;add [[Global Projects and Tools Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;strike&amp;gt;[[Global Membership Committee - Application 1|Tony UcedaVelez]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 3|Ofer Maor]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 5|Helen Gao]]&amp;lt;/strike&amp;gt;&amp;lt;br&amp;gt;[[Global Membership Committee - Application 4|Aryavalli Gandhi]]&amp;lt;br&amp;gt;add [[Global Membership - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;strike&amp;gt;[[Global Education Committee - Application 6|Zaki Akhmad]]&amp;lt;/strike&amp;gt;&amp;lt;br&amp;gt;[[Global Education Committee - Application 2|Carlos Serrão]]&amp;lt;br&amp;gt;[[Global Education Committee - Application 3|Sébastien Gioria]]&amp;lt;br&amp;gt;[[Global Education Committee - Application 5|Marc Chisinevski]]&amp;lt;br&amp;gt; [[Global Education Committee - Application 7|Tony Gottlieb]] &amp;lt;br&amp;gt;add [[Global Education Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;strike&amp;gt;[[Global Conferences Committee - Application 7|Mohd Fazli Azra]]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 9|Benjamin (Ben) Tomhave]]&amp;lt;/strike&amp;gt;&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 8|Zhendong Yu]]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 10|Josh Sokol]]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 11|Application 11]]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 12|Application 12]]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 13|Application 13]]&amp;lt;br&amp;gt;add [[Global Conferences Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;strike&amp;gt;[[Global Industry Committee - Application 1|Colin Watson]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 2|Alexander Fry]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 3|Yiannis Pavlosoglou]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 4|Joe Bernik]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 5|Lorna Alamri]]&amp;lt;br&amp;gt; [[Global Industry Committee - Application 6|Nishi Kumar]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 8|Mauro Florez]] &amp;lt;br&amp;gt;[[Global Industry Committee - Application 9|Mateo Martinez]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 10|Sherif Koussa]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 12|Christian Papathanasiou]]&amp;lt;/strike&amp;gt;&amp;lt;br&amp;gt;[[Global Industry Committee - Application 13|Michael Scovetta]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 14|Applicant 14]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 15|Applicant 15]] &amp;lt;br&amp;gt;add [[Global Industry Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;strike&amp;gt;&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 3|Mandeep Khera]]&amp;lt;br&amp;gt;&amp;lt;/strike&amp;gt;[[Global Chapter Committee - Application 4|Tin Zaw.]]&amp;lt;strike&amp;gt;&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 5|L. Gustavo C. Barbato]]&amp;lt;/strike&amp;gt;&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 8|Josh Sokol]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 9|Application 9]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 10|Application 10]]&amp;lt;br&amp;gt;add [[Global Chapter Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;strike&amp;gt;[[OWASP Connections Committee - Application 3|Justin Clarke]]&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 4|Jim Manico]]&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 6|Doug Wilson]]&amp;lt;/strike&amp;gt;&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 2|Robert Hansen]]&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 5|Greg Genung]]&amp;lt;br&amp;gt;add [[OWASP Connections Committee - Template|more]], if needed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== MEMBERS WITH OWASP SUMMIT'S APPROVAL  ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 90%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); -moz-background-inline-policy: continuous; color: white;&amp;quot; | '''OWASP GLOBAL COMMITTEES - ELECTED AT THE OWASP SUMMIT 08'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | OWASP GLOBAL COMMITTEES &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Projects Committee|'''Projects''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Membership Committee|'''Membership''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Education Committee|'''Education''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Conferences Committee|'''Conferences''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Industry Committee|'''Industry''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Chapter Committee|'''Chapters''']]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | Current committee members &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Dinis.cruz|Dinis Cruz]] &lt;br /&gt;
*[[:Image:Image021-Jason Li.jpg|Jason Li]] &lt;br /&gt;
*[[:Image:Image019-Matt Tesauro.jpg|Matt Tesauro]] &lt;br /&gt;
*[[:Image:Image022-Leo Cavallari.jpg|Leo Cavallari]] &lt;br /&gt;
*[[:Image:Image020-Pravir Chandra.jpg|Pravir Chandra]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Brennan|Tom Brennan]] &lt;br /&gt;
*[[:Image:Image018-Dan Cornell.jpg|Dan Cornell]] &lt;br /&gt;
*[[:Image:Image017-Michael Coates.jpg|Michael Coates]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[User:Sdeleersnyder|Seba Deleersnyder]] &lt;br /&gt;
*[[:Image:Image007-Martin Knobloch.jpg|Martin Knobloch]] &lt;br /&gt;
*[[:Image:Image012-Mano Paul.jpg|Mano Paul]] &lt;br /&gt;
*[[:Image:Image008-Eduardo Neves.jpg|Eduardo Neves]] &lt;br /&gt;
*[[:Image:Image010-Kuai Hinjosa.jpg|Kuai Hinjosa]] &lt;br /&gt;
*[[:Image:Image011-Cecil Su.jpg|Cecil Su]] &lt;br /&gt;
*[[:Image:Image009-Fabio Cerullo.jpg|Fabio Cerullo]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Wichers|Dave Wichers]] &lt;br /&gt;
*[[:Image:Image005-Wayne Huang.jpg|Wayne Huang]] &lt;br /&gt;
*[[:Image:Image003-Steve Antoniewicz.jpg|Steve Antoniewicz]] &lt;br /&gt;
*[[:Image:Image004-Dhruv Soi.jpg|Dhruv Soi]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Brennan|Tom Brennan]] &lt;br /&gt;
*[[:Image:Image014 Rex Booth.jpg|Rex Booth]] &lt;br /&gt;
*[[:Image:Image016-Georg Hess.jpg|Georg Hess]] &lt;br /&gt;
*[[:Image:Image013-Eoin Keary.jpg|Eoin Keary]] &lt;br /&gt;
*[[:Image:Image015-David Campbell.jpg|David Campbell]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[User:Sdeleersnyder|Seba Deleersnyder]] &lt;br /&gt;
*[[:Image:Image002-Puneet Mehta.jpg|Puneet Mehta]] &lt;br /&gt;
*[[:Image:Image001-Wayne Huang.jpg|Wayne Huang]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Tin Zaw</name></author>	</entry>

	</feed>